Friday, March 19, 2010

Hackers offered $100,000 for browser and phone exploits

Ex-Employee Wreaks Havoc on 100 Cars -- Wirelessly | National broadband plan: What's in it for businesses?

Network World Security

Forward this to a Friend >>>


Hackers offered $100,000 for browser and phone exploits
Security company 3Com TippingPoint has jacked up to $100,000 (£65,000) the prize money on offer to anyone able to hack a range of browsers and mobile devices at the forthcoming CanSecWest security conference. Read More


WHITE PAPER: Radware

Accelerating Next-Generation Data Center Initiatives
In today's business landscape, every business looks for solutions to enable key business drivers, such as increasing business productivity, agility, continuity, globalization, and regulatory compliance. Cost effective application delivery lies at the heart of this need. This paper details how to cost-consciously overcome these challenges. Learn More

WHITE PAPER: Compuware

5 Tips for Getting the Best Web App Performance
This eBook, compiled by Network World, explores the pressing issues, from dealing with outages and evaluating performance monitoring services, to the impact of virtualization. Get expert tips to optimize your Web apps. Learn More Now

Ex-Employee Wreaks Havoc on 100 Cars -- Wirelessly
More than 100 car owners in and around Austin, Texas recently discovered that their cars wouldn't start. Or that their horns wouldn't stop honking -- all night long. Or that their vehicle leases were suddenly (and luckily, temporarily) transferred to deceased rapper Tupac Shakur. Read More

National broadband plan: What's in it for businesses?
We've heard a lot about how the Federal Communications Commission's national broadband plan aims to provide 100 million U.S. households with 100Mbps broadband connections so far, but precious little on how it will affect enterprise users. Read More


WHITE PAPER: Qwest

Connecting to Better Customer Service
Less than a third of surveyed IT executives believe their companies are "highly effective" at adapting to changing customer needs and priorities. Businesses that build a robust voice and data network infrastructure can achieve a high level of responsiveness, and transform customer information and feedback into actionable results. Click here.

Estonia defense minister: Cyberattacks will grow
Three years after a widespread cyberattack temporarily shut down the Estonian economy, Estonia's defense minister said such incidents will only continue to grow. Read More

NASA, Russian astronauts set records, land back on Earth
Bumping back to Earth,  NASA's Jeff Williams and Russian Flight Engineer Max Suraev landed their Soyuz TMA-16 spacecraft on the steppes of Kazakhstan Thursday, wrapping up a five-and-a-half-month stay aboard the Read More


WEBCAST: ShoreTel

A Lower Cost Approach to UC
Learn about a switch-based architecture that provides the industry's lowest total cost of ownership while exploiting the full power of IP. See why this system beats the market leaders and has over 1 million users like Big Brothers/Big Sisters who candidly discuss their selection process, goals and ultimate success in moving to UC. Learn More!

Facebook users targeted in massive spam run
Facebook's 400 million users have been targeted by a spam run that could infect their computers with malicious software designed to steals passwords and other data, according to security researchers at McAfee. Read More

Pushing for software quality assurance
In my experience, some programmers and program development managers resist investing time in software quality assurance (SQA). In a recent research article on "Resistance Factors in the Implementation of Software Process Improvement Project in Malaysia," from the Journal of Computer Science 4(3):211-219 (2008), the authors summarized extensive published research on why people resist SQA. Experts have found that there are several categories of stumbling blocks to integrating SQA into the software development process (Table 1, p 213): Read More

New Internet browser threat sneaks by traditional defenses
An undetectable browser exploit that bares corporate networks to attackers tops the list of the most potentially effective new attacks that have been devised by researchers seeking vulnerabilities to take advantage of, according to a study by White Hat Security. Read More

IRS, DOJ use social media sites to track deadbeats, criminal activity
The Electronic Frontier Foundation has obtained documents showing how law enforcement agencies and the Internal Revenue Service are gathering information from social networking sites for their investigations. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

The Future of Big Iron
Do your IT plans include mainframes? Participate in this Aberdeen survey and see how your plans stack up to those of peers in terms of on what core applications are staying on mainframes and where the industry is headed in operating and software architecture. The goal is to get an accurate picture of the opportunity for expanded utilization, the role of 3rd-party support, and overall objectives with respect to distributed, outsourced, heterogeneous and centralized computing paradigms. Aberdeen will also establish a baseline for performance and a set of best practices for improving the efficiency and utilization of mainframe computing technologies. All survey respondents will receive a free copy of the resulting research.

Today from the Subnet communities

Massive giveaway from Cisco Subnet: 50 copies of the Cisco Press CCNP Cert Kits kits are up for grabs. Deadline March 31. NEW! 15 books on Microsoft System Center Operations Manager (OpsMgr) 2007 R2 available, too.

SLIDESHOWS

21 apps Apple doesn't want on your 3.0 iPhone
The following 21 apps today run only on jailbroken iPhones. Some may even prove precursors to features released in future Apple iPhone firmware updates.

10 geeky items you're embarrassed to admit you want
Most of us love gadgets. But there is a certain eye-popping reaction when we find a gadget that speaks to our technological selves. Owning such devices would surely be the subject of teasing from those who deny their inner geek, but it would also be the cause of more than a little envy.

MOST-READ STORIES

  1. Corporate IT eager to deploy Windows 7, survey shows
  2. How to know if your iPhone battery is on death row
  3. New Cisco Ethernet switches to play a broader video, security roles
  4. Microsoft touts "browser with no name" in Windows Phone 7
  5. Google traffic starting to dominate Internet
  6. How 10 famous technology products got their names
  7. Which browser is more secure?
  8. Cisco CRS-3 to disrupt Hollywood?
  9. Cisco battered by large fall in security market
  10. Windows Phone 7: A sneak peek at the apps

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment