Search This Blog

Monday, May 17, 2010

Car hackers can kill brakes, engine, and more

Five lessons Facebook needs to learn | Intelsat rogue satellite: Nothing to worry about

Network World Security

Forward this to a Friend >>>


Car hackers can kill brakes, engine, and more
University researchers have taken a close look at the computer systems used to run today's cars and discovered new ways to hack into them, sometimes with frightening results. Read More


WHITE PAPER: Oracle

Oracle Accelerate - Not Just Smart But Timely
This video highlights the Oracle Accelerate program - a group of pre-configured, tested solutions that combine Oracle enterprise applications and rapid implementation tools with industry-specific bundles. The program reduces the time, complexity and cost of deploying Oracle and is implemented by highly trained partners. Learn More.

WHITE PAPER: Brocade

Deployment Strategies for 802.11n
Many organizations are looking to reap the benefits of the new 802.11n standard, but what is the best way to deploy wireless technology while minimizing costs? Learn why understanding the "Three Cs"-context, coverage, and capacity-is critical for choosing an optimal network implementation strategy. Read More!

Five lessons Facebook needs to learn
Facebook has turned into a piñata, and it seems like everyone is getting their chance to whack it with a stick. So far we haven't seen any candy, but a lot of other interesting stuff has come flying out. Read More

Intelsat rogue satellite: Nothing to worry about
Looking to mitigate some of the fall-out from its rogue satellite, Intelsat today said its meandering Galaxy 15 satellite poses no real danger of crashing to Earth, or into another satellite.  Read More


WHITE PAPER: Riverbed

Overcome Two Key Challenges with Virtualization
How do you accelerate virtualization for your enterprise - and take IT flexibility and cost savings to the next level? Start by downloading this whitepaper from Riverbed. WAN optimization is a class of technology that has rapidly been adopted across enterprises in order to address the challenges of bandwidth limitations and latency over the WAN. Click here!

May Vulnerability Report - Sourcefire
May 14, 2010 - The latest security vulnerabilities and patching information, courtesy of Sourcefire. Read More

New Security Minister plans cyber-defence rethink
The UK has a new Security Minister, Baroness Pauline Neville-Jones, who takes up a non-cabinet post that gives her the job of shaking up the UK's fragmented cybersecurity infrastructure. Read More


WHITE PAPER: Splunk

Make IT Data a Strategic Asset
This paper outlines the struggles organizations face managing silos of IT data and how, using Splunk, users are changing the way they do their jobs and elevating the role of IT in their organizations. Learn More!

Mum's the word from all-hands Facebook company meeting on privacy
Right out of the gates, Facebook is staying mum about what went on during its all-hands-on-deck company privacy meeting late on Thursday. Read More

Symantec organizes its security products in suites to address evolving risks
Last week we looked at the dangerous new threats to sensitive data that are evolving. This week we look at the strategy Symantec has built to help its customers fend off the new kinds of attacks that require many layers of detection and protection to prevent. Read More

Disclosure laws push companies to improve security
Lawmakers calling for open government have a saying that "sunlight is the greatest disinfectant," arguing that when government has to disclose what it's doing, voters can better hold it accountable. It seems the same holds true for disclosure of enterprise security breaches. Read More

Budget 2010: New ICT systems boost border security measures
ICT will play a key role in boosting Australia's national security, with $500 million worth of funding announced in the 2010 Federal Budget. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

15 copies of CCNP ROUTE study kits available and 15 copies of Unix and Linux System Administration Handbook up for grabs, too.Deadline May 31.

SLIDESHOWS

Geeky Weddings, Birthdays, and Funerals
If you've ever dreamed of marrying a video-game character, having your ashes put in a computer, or holding your wedding on the deck of Star Trek's USS Enterprise, you're not alone.

2010 'Geek and Tech' Summer Movie Preview
It's summer movie time again, time for the movie studios to trot out its blockbusters with explosions and all sorts of fun. Here's our picks for the favorite movies that techies and geeks (comic book fans, unite!) will be lining up for.

MOST-READ STORIES

  1. Car hackers can kill brakes, engine and more
  2. Major Wi-Fi changes ahead
  3. Wikipedia lands $1.2M grant to improve 'public policy' articles
  4. IPv6: D-Day coming for ISPs
  5. Worst phishing menace may be prepping more dangerous version
  6. What WiMAX 2 promises
  7. Yahoo's ingenious plan to force users to switch to Gmail
  8. Natal to be on MTV with Cirque du Soleil
  9. New Adobe ad campaign shows Apple some tough love
  10. Facebook IDs hacker who tried to sell 1.5 million accounts

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: