Friday, July 24, 2009

Microsoft admits it can't stop Office file format hacks; Tech Tattoos; Ericsson enters bidding for Nortel wireless

Tech Tattoos: The Good, the Bad, and the R U SRS?!; Ericsson enters bidding for Nortel wireless business
Network World logo

Daily News AM Alert

NetworkWorld.com | Update Your Profile


Sponsored by Brocade
rule

The Enterprise Network Without Boundaries
It is difficult to deliver the network speed and security needed to keep today's "boundary-less" enterprise running 24x7. Learn how addressing three distinct network challenges can enable you to achieve consistent application delivery, enhanced security and a better user experience.

rule

Spotlight Story
Microsoft admits it can't stop Office file format hacks

Microsoft's plan to "sandbox" Office documents in the next version of its application suite is an admission that it can't keep hackers from exploiting file format bugs, a security analyst said today. Read full story

Related News:

Tech Tattoos: The Good, the Bad, and the R U SRS?!
Would you tattoo the Apple Safari logo on your forearm? What about a USB symbol? Get ready to see some of the worst (and best) tech tattoos around.

Ericsson enters bidding for Nortel wireless business
Ericsson has joined the bidding for Nortel's CDMA and LTE wireless assets, joining Nokia Siemens and private equity firm MatlinPatterson.

Another painful quarter: are Microsoft's cash-cow days over?
As expected, Microsoft has posted one of the most painful quarters in the company's history and its year-end results were also bleak.

New tool helps reconstruct attacks that don't leave traces on hard drives
Certain attacks that leave no trace on computer hard drives may be discoverable using a new tool that will be demonstrated at the Black Hat conference in Las Vegas next week.

Do you have any idea how much money you're wasting on international wireless services?
For a lot of companies, just a few users working or traveling overseas can rack up the bulk of cellular spending, for both voice and, increasingly, data.

R&D 100 list features Intel netbook processors and artificial retinas
R&D Magazine's annual list of 100 big tech advances isn't too heavy on network technologies, but Intel's netbook-powering Atom processors and RFinity's Mobile Open-Encryption Platform for securing mobile e-commerce did earn honors.

25% of firms suffer social-network phishing attacks
Cybercriminals are increasing the number of attacks on social networks, says Sophos.

Are Green Phones a Groundbreaker or a Gimmick?
Cell phone manufacturers don't have the greatest reputation for environmental awareness, but now they are jump-starting programs to improve their standing by lessening their carbon footprint. Perhaps the biggest leap is the introduction of green phones--cell phones composed of recycled materials and de­­signed for greater energy efficiency.

July Giveaways
Cisco Subnet is giving away 15 copies each of books on Enterprise Web 2.0 and Building a Greener Data Center; Microsoft Subnet is giving away training from New Horizons to one lucky reader and 15 copies of Microsoft SQL Server 2008 Reporting Services Unleashed. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages. Deadline for entries July 31.

Network World on Twitter? You bet we are


Botnet boom
BotnetsThe number of botnets has grown from about 1,500 two years ago to 3,500 today.

Watch this space
IT quizHere are 11 security companies to watch.

Distinguish your Business Through Superior Service
Distinguish your business from competitors by delivering superior service. Download this whitepaper today and discover how top-flight service management can deliver a world-class customer experience.
Read Now


 

July 24, 2009

TOP STORIES | MOST DUGG STORIES

  1. Windows 7 arrives: The time is finally ripe
  2. America's 10 most wanted botnets
  3. Apple takes legal heel off throat of wiki operator
  4. MIT electric car may rival gas models on performance
  5. ZerO1's mobile offer may be too good to be true
  6. Windows now serves Coke
  7. After report questions service, ZerO1 parent strips Web site
  8. Microsoft stuns Linux world, submits source code for kernel
  9. Adobe Flash vulnerability allows attack via malicious PDF file
  10. Microsoft finalizes Windows 7, Windows Server 2008 R2 code

Is your data center ready for virtualization?
Virtualization can deliver dramatic benefits for data centers, but it can also stress the underlying support infrastructure. Power and cooling systems—which may have been quite sufficient for pre-virtualization needs—could easily become inadequate when data center performance patterns are radically altered.
Learn More



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment