Tuesday, July 20, 2010

Dangerous Zero-day Windows Trojan; Apple may top Microsoft in revenue

  New rootkit threatens all versions of Windows | Apple may top Microsoft in revenue
 
  Network World Microsoft

Forward this to a Friend >>>


Dangerous Zero-day Windows Trojan Targets Espionage
Ms. Smith: There is a new vicious rootkit-level malware infection targeting critical infrastructure and aimed at corporate or government espionage. It often enters the enterprise through USB sticks. Read More


RESOURCE COMPLIMENTS OF: Insight

Get Microsoft Office 2010 today.
Get work done whenever and wherever with Microsoft Office 2010. New features expand collaboration, and access. See new features.

WHITE PAPER: IBM

Manage enterprise data with Integrated Data Management
Adopting an Integrated Data Management strategy can be a highly effective way to help IT support business growth, facilitate data governance and manage costs. It is also key to helping ensure that the enterprise derives maximum competitive advantage from its data. Read More!

New rootkit threatens all versions of Windows
Julie Bort: Microsoft has confirmed a new, highly dangerous zero-day vulnerability that has caused multiple researchers to issuing warnings. The exploit is a whopper on all levels. Read More

Apple may top Microsoft in revenue
Jon Brodkin: Some analysts expect Apple to report more quarterly revenue than Microsoft. Read More

How to fix sluggish Outlook performance
Rand Morimoto: For organizations using Microsoft Outlook and Exchange server with users complaining that Outlook is REALLY there are known problems and known fixes. Read More

EFF Fights To Allow People To Comment Anonymously Online
Ms. Smith: Should people be allowed to comment anonymously online? That question is currently making its way through the US legal system. Read More


WHITE PAPER: Qwest

The Myths, the Market Drivers and What You Need to Know
To create a consistent, seamless Unified Communications (UC) experience across your organization, you must first examine your existing infrastructure and business processes to determine what components will work best for your business. Get an overview of the potential benefits of UC, including key considerations for mapping out your UC strategy. Read now!

The spy who loved Windows
Robert Mullins: With the latest news that a 12th spy was reported to be scheming, this time inside a cubicle at Microsoft, I reached out to Ira Winkler, an expert on cybercrime and its role in corporate espionage, for perspective. Read More

PowerPivot vs Native SSAS
Brian Egler: PowerPivot is a great new technology for Self-Service BI. In previous blog entries I have outlined some of the technology using SQL Server 2008 R2 and Excel 2010. Read More

Privacy Watchdog Itself Leaks A Thousand Emails
Ms. Smith: An employee for a privacy group made a rookie mistake by sending a Reply-All email and actually breached the privacy of people who had emailed their concerns to the group about their privacy. Read More

Microsoft Partner Conference and the Cloud
Rand Morimoto: Last week was Microsoft's Worlwide Partner Conference, also known as WPC 2010, where over 14,000 attendees learned about Microsoft's strategy. They heard a lot about the cloud. Read More


VIDEO: IBM

Smarter Data Management
Integrated Data Management provides the capability to manage systems that require integration across different environments which span technologies, combine custom and packaged applications that may vary significantly in age, and are managed by a team of individuals who may or may not be in the same building. Learn More

Bing's first year
Robert Mullins: Microsoft search experts told reporters today that Bing, now with a big "1" plopped onto its birthday cake, has now reached double-digit market share in the U.S., is coming to Android and continues to innovate. And "Bing" as a verb? Still working on it. Read More

Stupidest excuse for slow app performance
Sean McCown: As a production DBA I see different problem scenarios all the time. And in every one of these scenarios there's always this blame game going on. Read More

Microsoft punches Cisco, VMware in the eye
Julie Bort: The Windows Azure Appliance that Microsoft announced on Monday combines cloud services and virtualization with an on-premises flexible server, networking, storage. Sound familiar? It should. Read More

Connecting to Social Networks from Outlook
Dustin Puryear: Outlook 2010 is going to connect to social networks like Facebook LinkedIn. Read More

Can the Windows File Classification Infrastructure save us?
Tyson Kopczynski: Let's face it. Managing data in the enterprise is a messy endeavor. I have yet to see an organization that has a 100% handle on where data should live, be used, protected, consumed, etc. Read More

 
 
 

Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

SLIDESHOWS

Robocop ran DOS
Virtually no sci-fi or action flick these days is complete without a computer scene showing a few screens of mysterious scrolling text and a 3D wire-frame model. But where does this vaguely tech-looking stuff come from? Well, more often than not, it comes from a Website, app, or startup screen from the real world at the time the movie was made. Read on for some of the most unexpected tech cameos in movies.

Top Russian spy ring technology screw-ups
Alleged Russian spies arrested last month in cities around the United States seemed to be lacking in spycraft and in urgent need of some IT expertise, based on some of the gaffes they made. They also used some technologies effectively. Here is a summary of their efforts as revealed in court filings against them.

MOST-READ STORIES

  1. Droid X vs. Droid
  2. Robocop ran DOS
  3. Air Force streamlines cybersecurity hiring for 680 open positions
  4. Cisco at a crossroads?
  5. The underappreciated antenna
  6. 15 summer vacation ideas for geeks
  7. Quest acquisition is strong IAM move
  8. Strangest Sights in Google Earth
  9. Cisco tops in IPS: survey
  10. Apple to give iPhone 4 users free cases

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_microsoft_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment