Search This Blog

Monday, November 23, 2009

New attack fells Internet Explorer; Oddball gifts for uber geeks; Cyberattacks on U.S. military jump sharply

Oddball Gifts for Uber Geeks; Cyberattacks on U.S. military jump sharply in 2009
Network World logo

Daily News AM Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by Sybase
rule

Bloor Research: Data Warehousing with Sybase
Read this Bloor Research report to see their views on data warehousing appliances, where they fall short and how Sybase IQ, with its column-based data base approach, provides superior performance and tuning flexibility.

Download the Report Now

rule

Spotlight Story
New attack fells Internet Explorer

A hacker has posted attack code that could be used to break into a PC running older versions of Microsoft's Internet Explorer browser. Read full story

Related News:

Oddball Gifts for Uber Geeks
These holiday gift ideas may surprise even the most hardened geeks in your life.

Cyberattacks on U.S. military jump sharply in 2009
Cyberattacks on the U.S. Department of Defense -- many of them coming from China -- have jumped sharply in 2009, a U.S. congressional committee reported Thursday.

Broadband stimulus grants delayed
The two government agencies in charge of doling out broadband stimulus cash have pushed back the dates for when they'll start handing out grants.

Global warming research exposed after hack
An anonymous hacker has posted private e-mails, files and other documents belonging to a noted climate researcher, sparking an international debate between skeptics of global warming and those who see it as an urgent problem.

Juniper steals spotlight from Cisco again with second flavor of 100G Ethernet
In the jostling to grab the headlines for next-gen 100Gbps Ethernet, Juniper this week unveiled its second offering: a 10x10G Ethernet physical interface card (PIC) for its T1600 core router.

Federal data breach highlights difficulties of data security
In January 2008, the Office of Management and Budget (OMB) instituted a security initiative called the Federal Desktop Core Configuration or FDCC. FDCC is comprised of about 300 settings on Windows PCs. The objective is to create a standard federal desktop configuration that eases operations and improves security.

New H-1B hiring bill takes aim at tech firms
Two U.S. Senators have proposed legislation that would bar any firm which lays off 50 or more workers from hiring guest workers holding H-1B visas.

What Chrome OS Means for Business
Today in Mountain View, Google held a press event to announce details of its upcoming Chrome OS. What it unveiled is an exciting new platform for Web computing that is aimed squarely at consumer netbooks, and has little relevance to businesses today.

Cisco Network Security Survival Guide
Get the real scoop of what Cisco's new term borderless networks is all about, learn how to use some of the mainstream hacking tools, and understand how you can use what you probably already have to better defend your network.

November giveaways
Cisco Subnet is giving away free books on VMware vSphere security. Microsoft Subnet is giving away training from New Horizons and free books on Exchange Server 2010. Google Subnet is giving away free books on Android app development. Entry forms can be found on the main contest page. Trivia answers are revealed on each main Subnet page.

Network World on Twitter? You bet we are


Ethernet everywhere!
Ethernet everywhereInside planes, trains, cars and spaceships, Ethernet is a morph master. Here's a look at some of Ethernet's cooler implementations.

7 tools to ease Windows 7 rollout
Windows 7These utilities help you plan, ensure app compatibility and manage images.

Executive Guide - Storage Virtualization
Storage virtualization isn't a no-brainer technology, and enterprise IT executives must carefully study how best to implement and manage it within their data centers. In these articles, Network World, along with its sister publications Computerworld and CIO, explore the benefits and challenges of storage virtualization.
Learn more


 

November 23, 2009

MOST-READ STORIES

  1. Microsoft Windows chief decries standards grandstanding
  2. The 5 best, and 5 worst, features of Google Chrome OS
  3. Federal government using PS3 to crack pedophile passwords
  4. 10G Ethernet cheat sheet
  5. Top 10 free Windows tools for IT pros, at a glance
  6. So you think you know Skype?
  7. NSA helped with Windows 7 development
  8. 3 basic steps to avoid joining a botnet
  9. Microsoft touts groundbreaking 'clip-on' for Active Directory
  10. FAA fixes computer glitch, delays remain

Why Print Management Matters
Print Management provides a breakthrough answer to today's top business challenge: reducing overhead without harming productivity. Jim Salzer of DocuAudit Intl. shows how Print Management allows you to control documentation expenses by outsourcing the management of your current print environment.
Download This Paper Now



EMO Labs: Better Sound Through Innovation at DEMOfall 09

EMO Labs' Invisible Speaker innovation takes People's Choice Award top honors at DEMO conference.
Watch EMO Labs product launch.


 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments: