Search This Blog

Friday, May 07, 2010

Hacker develops multi-platform rootkit for ATMs

Sixth grader usurps software company | FCC's broadband reclassification: What's next?

Network World Daily News AM

Forward this to a Friend >>>


Hacker develops multi-platform rootkit for ATMs
One year after his Black Hat talk on Automated Teller Machine security vulnerabilities was yanked by his employer, security researcher Barnaby Jack plans to deliver the talk and disclose a new ATM rootkit at the computer security conference. Read More


WEBCAST: Actuate

Solve Data Needs: BIRT Defined
This webcast will give you a primer on BIRT including the technology and the community. BIRT can help you overcome the challenge of delivering accurate and meaningful data to users while minimizing IT development efforts. Learn more today!

WHITE PAPER: F5 Networks

Geolocation and Application Delivery
Both business and technical stakeholders will find value and a broad range of uses for the highly accurate data available from a trusted third-party geolocation provider, especially when the data is integrated into a Unified Application and Data Delivery platform. This Whitepaper has all the details. Read More!

Sixth grader usurps software company
Thanks to education nonprofit PENCIL and Global Technology Preparatory, Jakai Wade took over IT management software maker CA, serving as company president for a day. Read More

FCC's broadband reclassification: What's next?
The U.S. Federal Communications will move quickly to claim some regulatory authority over broadband after Chairman Julius Genachowski announced the agency would reclassify broadband as a regulated service. Read More


WHITE PAPER: Oracle

Business Agility Strategies For Midsize Organizations
Midsize businesses have enormous IT pressures: building an infrastructure that is flexible, designed to accommodate rapid growth and meets compliance challenges with resources nowhere near larger enterprises. This video whitepaper explains how Oracle is delivering applications specifically for midsize businesses. Learn More

IPv6 tunnel basics
More Internet traffic is expected to be carried via tunnels as the Internet infrastructure migrates from IPv4, the current version of the Internet protocol, to the long-anticipated upgrade known as IPv6. Read More

Microsoft goes small for next week's Patch Tuesday
Microsoft today said it would patch two critical vulnerabilities with two updates to Windows and Office next week. Read More


WEBCAST: Webroot

Anatomy of a Complete Security Solution
Today's malware threats use any number of guises - viruses, phishing scams, network propagation, USB infection - but their motive is usually the same. Steal sensitive information. Attend this webinar to find out how to protect your organization against today's complex malware threats. Register now!

Cisco, EMC tap ex-Compaq CEO for joint venture
Former Compaq CEO Michael Capellas has been tapped by Cisco and EMC to lead the companies' Virtual Computing Environment (VCE) coalition. Read More

Microsoft patents portable applications
On Tuesday, Microsoft was awarded a U.S. patent for "portable applications." The description of this innovative technology? Running an executable file from a flash device. Read More

Data Leak Prevention Finally Gets an Open Source Alternative
Data Leak Prevention (DLP) has been a hot button technology in security for the last few years. Many of the big players in security like Symantec and McAfee have acquired companies to add this to their repertoire. Until now, it was also one of the few areas in security where a viable open source alternative did not exist. The new OpenDLP project is aiming to change that. It's about time! Read More

Study: CFO now chief IT decision-maker
The chief financial officer (CFO) is now becoming the top decision-maker when it comes to IT investments, according to a recent study. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

15 copies of CCNP ROUTE study kits available and 15 copies of Unix and Linux System Administration Handbook up for grabs, too.Deadline May 31.

SLIDESHOWS

Geeky Weddings, Birthdays, and Funerals
If you've ever dreamed of marrying a video-game character, having your ashes put in a computer, or holding your wedding on the deck of Star Trek's USS Enterprise, you're not alone.

2010 'Geek and Tech' Summer Movie Preview
It's summer movie time again, time for the movie studios to trot out its blockbusters with explosions and all sorts of fun. Here's our picks for the favorite movies that techies and geeks (comic book fans, unite!) will be lining up for.

MOST-READ STORIES

  1. Wi-Fi key-cracking kits sold in China mean free Internet
  2. Is the Android truly open source?
  3. Hacker develops multi-platform rootkit for ATMs
  4. 10 hot energy projects that could electrify the world
  5. Oral Roberts banishes Cisco
  6. FCC to claim some broadband regulatory power
  7. Microsoft woos developers with latest IE9 preview
  8. Ellen: "The people at Apple didn't think it was so funny"
  9. Indie developers create 'choose your own price' game bundle
  10. IE9 sure is faster, but users have mixed reactions

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: