Thursday, July 30, 2009

CERT and ISC warn about BIND9 DNS vulnerability; 16 breakthrough notebooks: A look back

16 Breakthrough Notebooks: A Look Back; Apple: Jailbreaking could knock out transmission towers
Network World logo

Daily News AM Alert

NetworkWorld.com | Update Your Profile


Sponsored by Riverbed
rule

The True ROI Behind WAN Optimization
NetForecast interviewed 11 Riverbed customers to learn firsthand their user experiences. This research identified 4 primary benefits realized with optimized application performance. Read this white paper for all the details.

rule

Spotlight Story
CERT and ISC warn about BIND9 DNS vulnerability

The Internet Systems Consortium and U.S. Computer Emergency Readiness Team are warning about a vulnerability discovered in the Berkeley Internet Name Domain 9 Domain Name Server code that could be exploited to cause a system crash. Read full story

Related News:

16 Breakthrough Notebooks: A Look Back
From the first prototype portable computer in 1968 to the OLPC XO (an inspiration for netbooks) to the CrunchPad Web tablet of the near future, these 16 notebooks mark important stages in the progress of laptops.

Apple: Jailbreaking could knock out transmission towers
Apple has told the U.S. Copyright Office that modifying the iPhone's operating system could crash a mobile phone network's transmission towers or allow people to avoid paying for phone calls.

Adobe confirms Flash contains Microsoft dev code bug
Adobe says it's the first major third-party vendor to have used Microsoft's flawed development code in its products. It patched Shockwave on Tuesday and promises a fix for Flash on Thursday.

Clampi Trojan revealed as financial-plundering botnet monster
A close look at the Clampi Trojan, an elusive piece of malware that uses encryption to help hide its nefarious data-stealing deeds, reveals it to be a botnet-controlled monster that can swipe a victim's sensitive data associated with more than 4,500 different sites, according to one researcher.

IBM, long the patent king, may put official at top of U.S. patent office
Big Blue may put one of its own officials at the top of the government office that oversees patents in America.

Recession no reason to neglect IT workforce, Gartner says
Gartner survey shows companies continue to put hiring and staff development on hold, despite specific skills being in demand.

Dr. BlackBerry: Eight Apps Making Medicine More Mobile
Physicians may not have been the first professionals to embrace BlackBerry devices and smartphones, in general. But they sure aren't wasting any time nowadays. Heck, Dr. John Halamka, CIO of both Beth Israel Deaconness and Harvard Medical School is regarded as a mobile guru, even appearing in his ownBlackBerry ad campaign.

Government departments guided on Tweeting
The government has launched a policy document to explain how to use Twitter.

BBN grabs cash, turns up heat on language translation technology
When it comes to translating languages in real time, BBN must speak the tongue as it netted a $14 million check from the Defense Advanced Research Projects Agency (DARPA) this week to continue developing its speech and text technology. 

July Giveaways
Cisco Subnet is giving away 15 copies each of books on Enterprise Web 2.0 and Building a Greener Data Center; Microsoft Subnet is giving away training from New Horizons to one lucky reader and 15 copies of Microsoft SQL Server 2008 Reporting Services Unleashed. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages. Deadline for entries July 31.

Network World on Twitter? You bet we are


Botnet boom
BotnetsThe number of botnets has grown from about 1,500 two years ago to 3,500 today.

Watch this space
IT quizHere are 11 security companies to watch.

Identity Management: complexity made simple
Sun's pragmatic approach to identity management combats complexity with everyday solutions, helping you streamline and simplify the identity infrastructure to reduce costs, tighten security, and mitigate risk. View the Sun Identity Management Solution Center today.
Learn More


 

July 30, 2009

TOP STORIES | MOST DUGG STORIES

  1. Black Hat's most notorious incidents
  2. 7 half-truths about virtualization
  3. Low-tech Internet scams net big money
  4. Tweet prompts libel suit
  5. Microsoft rushes patch for 'deep' bug
  6. America's 10 most wanted botnets
  7. Broken iPhones
  8. 10 cutting edge spy gadgets
  9. Apple jettisoning Google Voice
  10. Five technologies Iran is using to censor the Web

Perfecting your Disaster Recovery Strategy
How fast can you recover data in the event of a disaster? Optimize your backup and disaster recover strategy with this Executive Guide. Get expert tips and recommendations in this collection of in-depth articles from Network World and its sister publications.
Learn More



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment