Search This Blog

Thursday, June 03, 2010

Microsoft counters report of Google's dumping Windows

Android rootkit is just a phone call away | Cyberattacks seen as top threat to zap U.S. power grid

Network World Security

Forward this to a Friend >>>


Microsoft counters report of Google's dumping Windows
On the heels of a report that Google will phase out Windows in its workplace over security concerns, Microsoft on Tuesday stood up for its operating system. Read More


WHITE PAPER: Tripwire

Log Mangement in a Cyberworld
Cybercrime, increasingly operated under well-muscled organized crime syndicates, has become a huge threat. With so many potential cyber villains poking around the gates, enterprises must have strong protections and pristine visibility into what's happening on the network. Read Now

WHITE PAPER: Novell

File Management Suite
Better track and understand storage patterns, allocate and manage storage based on its relevance and value to the business, while saving money in the administration and procurement of storage resources. Learn to get a handle on the unchecked proliferation of data. Read Now

Android rootkit is just a phone call away
Hoping to understand what a new generation of mobile malware could resemble, security researchers will demonstrate a malicious "rootkit" program they've written for Google's Android phone next month at the Defcon hacking conference in Las Vegas. Read More

Cyberattacks seen as top threat to zap U.S. power grid
Cyber attacks, pandemics and electromagnetic disturbances are the three top "high impact" risks to the U.S. and Canadian power-generation grids, according to a report from the North American Electric Reliability Corp. (NERC) Read More


E-GUIDE: Compuware

Perfecting Application Performance
The enterprise application scene has become increasingly complicated over the years. Things have changed with the rise of Web services, SOA, Virtualization and cloud computing. In this Executive Guide explore how to get the best performance out of today's application environments. Read Now.

Cisco issues advisory for building management systems
Cisco has issued a security advisory for its Network Building Mediator (NBM) and legacy Richards-Zeta Mediator products. The products allow different building systems to communicate with each other for facilities management.Cisco acquired Richards-Zeta last year. Read More

The Dangers of Cloud Computing
Cloud services can be a huge money saver for businesses and looks to be the future direction of IT for many. I'm a huge proponent for cloud services as long as folks enter into agreements with their eyes wide open. To this end here are five things you need to be aware of before you move your data to a cloud service. There are three types of cloud services: Infrastructure as a Service, Platforma... Read More


WHITE PAPER: HP

SMB: Strategy Guide to Risk Mitigation
This strategy guide offers concrete risk mitigation techniques specifically designed for midsize organizations. Learn how to proactively manage physical and virtual systems and see the early signs of infrastructure trouble to avoid outages. Read Now!

Photo forensics: Identifying faked pictures
Recently a family member sent me a set of pictures supposedly showing Mexican headstones with insulting epitaphs: Read More

Windows, Mac, or Linux: It's Not the OS, It's the User
Who's got the safest operating system? Apple, Google, Microsoft? According to one security expert, what really matters is who's using the OS. Read More

Will Fed Intervention Curb or Protect Your Digital Freedom?
Considering the high-tech industry's expanding reach into everyday consumer life, it should be no surprise that Washington, D.C. has taken a closer look at the Internet economy of late. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

15 copies of CCNP ROUTE study kits available and 15 copies of Unix and Linux System Administration Handbook up for grabs, too.Deadline May 31.

SLIDESHOWS

10 useful Firefox-based apps
Here are 10 useful desktop programs that run on the open-source Web browser's native technology. All of these applications are free for you to download and use -- and only one is a Web browser.

Steve Ballmer as emoticons
It's not often hard to guess what Steve Ballmer is feeling. The Microsoft CEO has one of the most recognized, and photographed, faces in the IT industry - and it's also one of the most expressive.

MOST-READ STORIES

  1. Happy Quit Facebook Day! Now what?
  2. Open source could be Africa's technological solution
  3. 'Lifejacking' exploit fools Facebook users and friends
  4. 10 useful Firefox-based apps
  5. How to foil Web browser 'tabnapping'
  6. Steve Jobs says Flash has had its day
  7. HTC Evo 4G: What's inside first WiMAX smartphone
  8. The dangers of cloud computing
  9. Six misconceptions about cloud apps
  10. Will an open-source alternative to Facebook actually work?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: