Tuesday, July 28, 2009

Black Hat's most notorious incidents; 7 half-truths about virtualization; Most Windows users vulnerable to Flash attacks

7 half-truths about virtualization; Almost all Windows users vulnerable to Flash zero-day attacks
Network World logo

Daily News AM Alert

NetworkWorld.com | Update Your Profile


Sponsored by IBM NWW
rule

Addressing the Complexities of Remote Data Protection
Data protection and recovery can be a complicated problem in remote offices. But there are options. This white paper explores a range of possibilities, and shows how an adaptive data protection solution can protect remotely stored data for enterprises of all sizes.

rule

Spotlight Story
Black Hat's most notorious incidents: a quiz

As Black Hat 2009 convenes this week in Las Vegas, a look back at previous conferences reveals why it's such a big draw – presenters continue to deliver briefings that shock, amaze and amuse. See how well you remember some notorious incidents by taking this quiz. Read full story

Related News:

7 half-truths about virtualization
Your virtualization deployment could be tripped up if you don't consider these potential roadblocks.

Almost all Windows users vulnerable to Flash zero-day attacks
More than 90% of Windows users are vulnerable to the Flash zero-day vulnerability that Adobe won't patch until Thursday, a Danish security company said today.

Congress may push India's IT firms to Mexico with H-1B crackdown
Indian firms worried about the threat of H-1B restrictions in the U.S. might look to increase their presence south of the border, in Mexico.

Low-tech Internet scams net big money
Domino's Pizza lost about $77,000 in free pizza due to a weak password on an online promotion that wasn't supposed to go live -- a type of security problem that is all too common, according to a presentation slated for the Black Hat USA conference this week.

Don't mean to bore you, but a yawn detector's in the works
U.S. and Indian researchers have joined forces to design a computer program that can detect when you're yawning - a potentially life-saving invention for drivers and others on the road. 10 wicked cool algorithms

Ericsson's winning Nortel bid to strengthen its North American presence
Ericsson's winning bid for Nortel's wireless assets is intended to strengthen the Swedish telecom giant's presence in North America, company executives said during a conference call Monday.

Cisco fortifies data center storage capabilities
Cisco this week added new features to its MDS 9000 SAN switches in an effort to enhance storage performance on IBM mainframes as well as third-party SAN products. The enhancements to the MDS 9000 are intended to improve security and accelerate data traffic over distances as far as 20,000 kilometers, according to this report from colleague Jon Brodkin.

Air Force foretells drone that can make attack decisions on its own
By 2047 the Air Force says unmanned aircraft with blazing artificial intelligence systems could fly over a target and determine whether or not to unleash lethal weapons - without human intervention.

AP's puzzling crusade continues to confound
As you might expect given my 30-plus years as a journalist, I am something of a copyright hardliner: Content producers should be compensated for their work and others should not leach off it willy-nilly.

Hybrid clouds the way to go
In these tough economic times it has become rather common to hear upper management ask questions such as, "I've read about that cloud computing thing. Why aren't we using the cloud instead of buying so many servers?" But is the cloud ready? The answer, as any good engineer would tell you, is "it depends."

July Giveaways
Cisco Subnet is giving away 15 copies each of books on Enterprise Web 2.0 and Building a Greener Data Center; Microsoft Subnet is giving away training from New Horizons to one lucky reader and 15 copies of Microsoft SQL Server 2008 Reporting Services Unleashed. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages. Deadline for entries July 31.

Network World on Twitter? You bet we are


Botnet boom
BotnetsThe number of botnets has grown from about 1,500 two years ago to 3,500 today.

Watch this space
IT quizHere are 11 security companies to watch.

Effectively Supporting Consumer-Owned Smartphones
Resolve Smartphone downtime incidents quickly by sharpening your approach to mobile device management. In this whitepaper Osterman Research clearly explains which Smartphones are being used, how IT shops are managing these devices and how the heterogeneous nature of the market is causing more complexity for IT professionals.
Learn More


 

July 28, 2009

TOP STORIES | MOST DUGG STORIES

  1. Five technologies Iran is using to censor the Web
  2. America's 10 most wanted botnets
  3. EC decision expected to force IE to better support standards
  4. 10 cutting edge spy gadgets
  5. Better Apple rumor: $800 tablet by Christmas, really
  6. Microsoft to rush out emergency IE patch
  7. Ericsson wins auction to buy Nortel wireless business
  8. Best data loss prevention tools
  9. Tech tattoos: The good, the bad and the RU SRS?!
  10. Network Solutions warns merchants after hack

Application Performance Solution Center
Review this site on managed application delivery services for your Enterprise. Peruse these whitepapers, and other offers to get up to date on your WAN needs.
Review this site today.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment