Thursday, September 10, 2009

Cisco fixes TCP denial-of-service bug; Gear that survives almost any calamity; 7 reasons Web sites no longer safe

Tough Tech: Rugged Gear That Can Survive Almost Any Calamity; 7 Reasons Websites Are No Longer Safe
Network World logo

Daily News AM Alert

NetworkWorld.com | Update Your Profile


Sponsored by Radware
rule

Boost Your Immunity with New DefensePro!
New models of DefensePro offer on demand IPS scalability and behavioral protection up to more than 12Gbps for unmatched Data Center security performance and lowest TCO. Your Best Defense for a Healthy Network Just Got Better. Learn More

Learn More Now

rule

Spotlight Story
Cisco fixes TCP denial-of-service bug

Cisco this week issued a patch for a denial-of-service vulnerability that affects multiple products. Read full story

Related News:

Tough Tech: Rugged Gear That Can Survive Almost Any Calamity
Worried about dropping your cell phone in the pool? Getting caught in the rain with your laptop? Pushing your camera off of a ledge? These sturdy gadgets can survive all that and more.

7 Reasons Websites Are No Longer Safe
Conventional wisdom is that Web wanderers are safe as long as they avoid sites that serve up pornography, stock tips, games and the like. But according to recently gathered research from Boston-based IT security and control firm Sophos, sites we take for granted are not as secure as they appear.

Recession leads to sluggish global broadband growth
Broadband growth is still reeling from the economic downturn, but there are also tentative signs of a recovery, according to market research company Point Topic.

Making IPSec VPNs Enterprise Class
The last newsletter highlighted the fact that the improvements that we have seen over the last twenty-five years in the price/performance ratio of wide area networking is nothing close to the price/performance improvements that we have seen for other areas of IT such as storage or processing. This newsletter will discuss a technique to turn low cost consumer-grade IPSec VPNs into an enterprise-class IPSec VPN.

FCC report: Agency can improve disaster response
The U.S. Federal Communications Commission is generally ready for emergencies such as cyberattacks and pandemic flu outbreaks, but it can do more to guard against disasters, according to a report released Tuesday.

My, What a Long Tail You Have
Recently, Androlib.com has made available statistics they have culled from the Android Market. Their data highlights how the Android Market is not that dissimilar from other markets, and so Android developers can use lessons learned elsewhere to help them understand how the Android Market behaves.

Apple refreshes iPod line-up, cuts prices, retools iTunes
Apple CEO Steve Jobs today took the stage at a company event for the first time in almost a year to introduce new iPhone software, a revamped iTunes, reduced iPod Touch prices and a video camera slipped into the iPod Nano.

'Wiretapping' charges may be the silliest ever recorded
Chi Quang Truong, 46, is being charged by police in Natick, Massachusetts with "unlawful wiretapping and possessing a device for wiretapping," according to this story in The MetroWest Daily News. If you're thinking foreign spy or industrial espionage, think again.

Microsoft Subnet is giving away training from New Horizons and 15 copies of Windows Server 2008 How-To. Cisco Subnet is giving away 15 copies of Interconnecting Data Centers Using VPLS. Google Subnet is hosting many new bloggers (watch for giveaway information soon.) Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


10 sports technologies to love, 5 to hate
Sports technologiesMany technologies help fans enjoy sports. Others just annoy.

Apple disasters
Apple disastersApple has enjoyed huge success with the iPod and iPhone, but Apple has had a number of commercial flops, too.

Independent Test Results: Citrix vs. F5
Latency is an important metric when measuring Web applications. See the benchmark results from independent tester, Tolly, to learn how Citrix fared against F5 in a wide range of scenarios.
Learn More


Live Event: Enterprise Database Security
Make the most of your existing resources without draining your IT budget with a successful database security strategy. Join Industry experts, including Noel Yuhanna, Principal Analyst at Forrester Research for this live event scheduled for Thursday, September 24 at 2 p.m. ET / 11 a.m. PT to learn how. Protect your enterprise assets and ensure regulatory compliance.
Register for this Live Event now.

 

September 10, 2009

TOP STORIES | MOST DUGG STORIES

  1. How to make yourself layoff-proof
  2. The history of steganography
  3. 20 goofy USB gadgets & gizmos you'll love
  4. 12 words you can never say in the office
  5. Developer denies software to beat Chinese censors is malicious
  6. How to get fired
  7. Dirty vendor secrets
  8. How emerging wireless techs are transforming healthcare
  9. Microsoft rivals to purchase 22 patents to defend Linux
  10. Can you see John Chambers directing Cisco to buy Alcatel-Lucent?

Mapping Out a Successful IT Consolidation Plan
Mapping out a 5 step consolidation process can ensure that the goals of IT consolidation are achieved. Read this white paper to learn how to reduce IT management overhead, ease revision control, guarantee data security, scale systems more quickly and reduce server and software costs.
Learn more.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment