Search This Blog

Tuesday, November 17, 2009

Are nations paying criminals for botnet attacks? Brocade takes aim at Cisco; Printers with high costs

Don't Let Your Printer Suck Your Wallet Dry; News podcast: Network World 360
Network World logo

Daily News PM Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by 3COM
rule

Comprehensive NAC
Read this whitepaper on improving endpoint defense, control and visibility through integrated management and enforcement.

Learn more

rule

Spotlight Story
Are nations paying criminals for botnet attacks?

Nations that want to disrupt their enemies' banking, media and government resources don't need their own technical skills; they can simply order botnet attack services from cybercriminals. Read full story

Related News:

Don't Let Your Printer Suck Your Wallet Dry
Some printers charge exorbitant prices for their replacement ink or toner. Here are seven printers worth avoiding--and four much cheaper alternatives.

News podcast: Network World 360
A new report from McAfee suggests that nations that want to disrupt their enemies banking, media and government resources don't need their own technical skills – they can simply order botnet attack services from cybercriminals. Also, proving that social networking is a huge cultural force, the New Oxford American Dictionary has chosen 'unfriend' as its 2009 Word of the Year. (5:32)

Brocade takes aim at Cisco with new Carrier Ethernet line
Brocade has launched a line of small form factor Carrier Ethernet routers designed to make Ethernet service delivery at the edge more cost and power efficient.

The Future of Linux is Google
I used to think Ubuntu was destined to lead Linux into the mainstream, but now it's looking much more like Google--not Canonical--will be the first Linux vendor to truly challenge Microsoft.

Microsoft cofounder Paul Allen has lymphoma
Microsoft cofounder Paul Allen has been diagnosed with lymphoma.

Email to become extinct in 10 years?
Email could die-out in the next ten years in favour of instant messaging, says TalkTalk.

Endpoint security frustrates IT
There's a groundswell of frustration about today's endpoint security, as well as worries about how newer technologies such as virtualization or cloud computing will impact it, according to a new study.

IT takes biggest job-cut hit in the back office
Two million IT positions are expected to have been eliminated from 2000 to 2014, according to Hackett Group, which forecasts an 'extended jobless recovery.'

T-Moble's Sidekick out of the doghouse, back on sale
T-Mobile, about a month after a service outage threatened to eliminate data on its customers' Sidekick smartphones, has started selling the devices again.

HP pushes thin clients with new hardware, tools
Hewlett-Packard is trying to tackle concerns about the cost and complexity of thin-client computing with new products and tools announced Tuesday.

November giveaways
Cisco Subnet is giving away free books on VMware vSphere security. Microsoft Subnet is giving away training from New Horizons and free books on Exchange Server 2010. Google Subnet is giving away free books on Android app development. Entry forms can be found on the main contest page. Trivia answers are revealed on each main Subnet page.

Network World on Twitter? You bet we are


Ethernet everywhere!
Ethernet everywhereInside planes, trains, cars and spaceships, Ethernet is a morph master. Here's a look at some of Ethernet's cooler implementations.

7 tools to ease Windows 7 rollout
Windows 7These utilities help you plan, ensure app compatibility and manage images.

Improving Application Performance Troubleshooting
Dramatically reduce downtime with the right tools. This whitepaper explains the four key features your application performance management toolset should include. Look for automation, intuitive analysis, real-time support and proactive problem solving.
Read More


 

November 17, 2009

MOST-READ STORIES

  1. Cray blows by IBM to regain supercomputing crown
  2. Microsoft's new lab pushes social networking boundaries
  3. 2009's top 10 emerging enterprise technologies
  4. Cool Yule Tools
  5. Shifting mobile cost to employees? Think twice
  6. Hackers outwit Windows 7 activation
  7. Latest WebOS update for the Palm Pre lacks iTunes support
  8. HP's 3Com acquisition: An inside look
  9. Supercomputers with 100 million cores coming by 2018
  10. Cisco ups offer for videoconferencing firm Tandberg to $3.4B

Closing the Risk Gap in Privileged Access Control
In this whitepaper, Enterprise Management Associates (EMA) examines this critical issue in IT security administration in light of the BeyondTrust approach to helping businesses move from a trust-based system to a secure, auditable process in order to provide a higher standard of control and better support for regulatory compliance.
Click here to read more!



EMO Labs: Better Sound Through Innovation at DEMOfall 09

EMO Labs' Invisible Speaker innovation takes People's Choice Award top honors at DEMO conference.
Watch EMO Labs product launch.


 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments: