Search This Blog

Friday, April 09, 2010

1-in-10 Windows PCs still vulnerable to Conficker worm

IBM & the Masters: Technology Sponsorship Unlike Most Others | Apple iPad users offered 'antivirus' software

Network World Security

Forward this to a Friend >>>


1-in-10 Windows PCs still vulnerable to Conficker worm
More than a year after doomsday reports suggested the Conficker worm would bring down the Internet, one-in-10 Windows PCs still have not been patched to plug the hole the worm wriggles through, new data shows. Read More


WHITE PAPER: AccelOps

IT Service Management: Beyond the Myths
Discover best practices and supporting technologies that deliver the straightest path to service reliability, operational efficiency and effective ROI. Also, examine three case studies that show how IT service management works in the real world. Read More!

E-GUIDE: APC by Schneider Electric

5 Ways to Shrink a Data Center
Most data centers can support an average density of 100 to 200 watts per sq. foot. The future of high-density computing – beyond 30 KW - will have to rely on water-based cooling, but is that cost effective? This expert guide discusses the latest energy technologies for today and the future. Read Now.

IBM & the Masters: Technology Sponsorship Unlike Most Others
When viewers tune in to coverage of the 2010 Masters golf tournament, they will see IBM advertisements on the CBS and ESPN TV broadcasts and the IBM logo on the Masters.com website. Viewers will most likely hear about IBM's vision of a "smarter planet" campaign. (I always look forward to the guy who says "Smarter Stuttgart.") Read More

Apple iPad users offered 'antivirus' software
Apple iPad users are being offered a security program to scan their new device for vulnerabilities and rogue software should such things emerge as threats. Read More


WHITE PAPER: Riverbed

Overcome Two Key Challenges with Virtualization
How do you accelerate virtualization for your enterprise - and take IT flexibility and cost savings to the next level? Start by downloading this whitepaper from Riverbed. WAN optimization is a class of technology that has rapidly been adopted across enterprises in order to address the challenges of bandwidth limitations and latency over the WAN. Click here!

Mobile Device Security Woes
Great article by Tim Greene on endpoint security (http://www.networkworld.com/news/2010/040110-endpoint-security.html?hpg1=bn). One of Tim's points was with regard to mobile device security. Large organizations now realize that endpoint security (and management) extends beyond PCs to mobile devices like Blackberrys, Droids, iPhones, iPads (author's note: just had to get in an iPad reference today),... Read More

South Park skewers high tech
Facebook is just the latest high-tech South Park skewering: iPhone, Bill Gates, Star Trek, the Internet all get lampooned Read More


WHITE PAPER: Cisco Systems Inc.

Improve Productivity by Optimizing your SSL VPN
Are you getting all you can from your SSL VPN? Read this whitepaper to find out Learn More

Teen Sues Mom for Hacking Facebook Account
Suing your parents isn't just for celebrities anymore--a 16-year-old Arkansas boy is suing his mother for hacking into his Facebook account and allegedly posting slanderous remarks. Read More

Privacy groups file FTC complaint on behavioral advertising
Three privacy groups have filed a complaint with the U.S. Federal Trade Commission about behavioral advertising practices, accusing Google, Yahoo and other advertising vendors of creating a "Wild West" atmosphere with few rules for protecting consumer privacy. Read More

Will you trust your company to the iPad 3G?
I have been talking to many CIOs in the last two weeks who have expressed a concern that the iPad 3G version will fail and their workers with it. Concerns are growing over the AT&T network with the upcoming release of the 3G version of the iPad. Read More

Five things you need to tell your parents about computer security
Ever get that tech support call from your parents saying, "My computer is slow all of a sudden" or "I have all sorts of weird things popping up on my screen"? You then troubleshoot the problems only to find out that malware, spyware, viruses or other such nastiness is the culprit. To be sure you eradicate all the bugs you resort to a full format and reinstall of everything thus taking you hours.... Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

The Future of Big Iron
Do your IT plans include mainframes? Participate in this Aberdeen survey and see how your plans stack up to those of peers in terms of on what core applications are staying on mainframes and where the industry is headed in operating and software architecture. The goal is to get an accurate picture of the opportunity for expanded utilization, the role of 3rd-party support, and overall objectives with respect to distributed, outsourced, heterogeneous and centralized computing paradigms. Aberdeen will also establish a baseline for performance and a set of best practices for improving the efficiency and utilization of mainframe computing technologies. All survey respondents will receive a free copy of the resulting research.

Today from the Subnet communities

15 copies of CompTIA A+ study kits (book, video, flash cards) are available from Cisco Subnet.Deadline April 30. 15 books on Microsoft Systems Center Enterprise suite are available, too.

SLIDESHOWS

5 things we love/hate about Novell's SUSE Studio
Users might have a love/hate relationship with Novell's SUSE Studio. Here are five things we love and five things we disliked about the product.

CEO payday: What tech's top execs made in '09
The recession took its toll on tech CEOs' compensation in 2009, but not everyone lost.

MOST-READ STORIES

  1. Mystery solved: Why time stands still at 9:42 on iPhone
  2. The oddest places to find Linux
  3. South Park skewers high-tech icons
  4. iPad wish list: 10 things I'd like on iPad 2.0
  5. Is the U.S. the nation most vulnerable to cyberattack?
  6. BofA insider to plead guilty to hacking ATMs
  7. The iPad and accessories: What you need to know
  8. Apple stock continues to soar to new heights
  9. In cyberwar, who's in charge?
  10. Does Big Blue speak open source with a forked tongue?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: