Tuesday, September 22, 2009

FCC's net neutrality plan draws fire; Best smartphones for under $100; A data breach with a twist

Best Smartphones for Under $100; Products of the Week
Network World logo

Daily News PM Alert

NetworkWorld.com | Update Your Profile


Sponsored by IBM NWW
rule

Staying a step ahead of the hackers
Security managers may work for midsize or large organizations; they may operate from anywhere on the globe. But inevitably, they share a common goal: to better manage the risks associated with their business infrastructure. Increasingly, Web application security plays a significant role in achieving that goal.

Learn More

rule

Spotlight Story
FCC's Net Neutrality Plan Draws Fast Fire

FCC Chairman Julius Genachowski announced Monday that the FCC would prevent broadband carriers from limiting your access to high-speed Internet for things like Internet-based voice calls, video streaming, and legal file sharing (that carriers might wish to block or at least charge extra for). As expected, not everyone is happy with Genachowski's concept of what a free and open Internet should be. Read full story

Related News:

Best Smartphones for Under $100
No need to pay big bucks for a high-quality, full-featured smartphone. We've rounded up the best inexpensive models across the four major carriers. Whether you're a social networker, a business executive, or a multimedia addict, there's a wallet-friendly smartphone for you.

Products of the Week
Our round-up of intriguing new products from EMC, Numara, ArcSight among others.

A data breach with a twist
An employee at a Wyoming bank screws up and sends a bunch of confidential customer information to the wrong Gmail account. When the inadvertent recipient fails to even acknowledge a subsequent "please delete that" plea from the bank, the bank sues Google to force the company to cough up the recipient's contact information.

Desktop takes back seat at Linux conference
Leaders in the Linux community seemed resigned to the fact that Linux still hasn't made headway in the desktop market, but they made it clear on Monday that their success in other markets, such as mobile, is at least as important.

Scammers auto-generate Twitter accounts to spread scareware
Scammers are using machine-generated Twitter accounts to post messages about trendy topics, and tempt users into clicking on a link that leads to servers hosting fake Windows antivirus software, security researchers said.

Botnet PCs stay infected for years
A hardcore of PCs controlled by botnets stay that way for years, an analysis from security vendor Trend Micro has found.

Researchers overwhelming vendors with security flaws
Booming numbers of security researchers are uncovering so many flaws that vendors are finding it almost impossible to patch them all in a reasonable timeframe, the latest SANS report has found.

Trans-Atlantic cables gets green light
The PIPE Networks undersea cable system, PIPE Pacific Cable (PPC-1), has successfully undergone tests, through the transmission of IP packets between Australia and the US, ahead of its launch next month.

Seagate ships self-encrypting drives for enterprises
Seagate said it is offering its self-encrypting drive feature with its entire line of enterprise-class hard disk drives and that it has partnered with Intel and LSI to integrate its encryption technology with the two companies' security management firmware.

Microsoft Subnet is giving away training from New Horizons and 15 copies of Windows Server 2008 How-To. Cisco Subnet is giving away 15 copies of Interconnecting Data Centers Using VPLS. Google Subnet is hosting many new bloggers (watch for giveaway information soon.) Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


The history of steganography
SteganographyThere is a wealth of methods for creating encrypted messages you can't even tell are there.

Top 10 cool satellite projects
SatellitesSatellites are, by their very definition, cool.

Mobile Device Management for Dummies
Mobile Device Management For Dummies is your guide to the management and security of mobile computing equipment such as laptops and handheld devices. This book gives you the key insights on enterprise mobile device management and how Afaria®, the market leading solution, can help you.
Learn More


Live Event: Enterprise Database Security
Make the most of your existing resources without draining your IT budget with a successful database security strategy. Join Industry experts, including Noel Yuhanna, Principal Analyst at Forrester Research for this live event scheduled for Thursday, September 24 at 2 p.m. ET / 11 a.m. PT to learn how. Protect your enterprise assets and ensure regulatory compliance.
Register for this Live Event now.

 

September 22, 2009

MOST-READ STORIES

  1. Microsoft declares war on 'scareware'
  2. Cisco taps Microsoft exec to head collaboration
  3. The most promising games of fall 2009
  4. Dell buying Perot Systems for $3.9 billion
  5. Microsoft urges users to disable vulnerable Win net protocol
  6. 10G Ethernet shakes net design to the core
  7. Will Google Wave make the network just dumb plumbing?
  8. Are netbooks ready for the enterprise?
  9. 13 hot products from DEMOfall '09
  10. WiMAX in 2010: Too little, too late?

NetScaler VPX: Harness the Power of Virtualized Web App Delivery
Technical Whitepaper – "NetScaler VPX: Harness the Power of Virtualized Web App Delivery" – shows you how the NetScaler VPX virtual appliance offers maximum physical, functional, and operational flexibility for delivering web apps. Learn how virtual application delivery controllers can unleash the power of a virtualized dynamic data center! Compliments of Citrix.
Read Now



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment