Understanding Web 2.0 security in the workplace | Bad guys could read RFID passports at 217 feet, maybe a lot more | ||||||||||
Network World Daily News PM | ||||||||||
'Unhackable' Android can be hacked WHITE PAPER: Eaton Unleashing Stranded Power and Cooling from Data Centers This white paper examines the underlying roots of today's data center power and cooling crisis and outlines five steps businesses can take to support intensifying IT requirements economically by removing inefficiencies from their power and cooling infrastructure. Read More In this Issue
WHITE PAPER: NetApp Best Practices for Design, Architecture and Management This document provides NetApp best practices for architecting, sizing, and deploying a VMware® VDI environment on NetApp® storage. Learn more. Understanding Web 2.0 security in the workplace Bad guys could read RFID passports at 217 feet, maybe a lot more Microsoft's bug reports fail to produce prompt patches WHITE PAPER: Red Hat Planning Guide: SAP to Red Hat Migration Lower costs and improve performance migrating SAP to Red Hat Enterprise Linux. Download this guide today and discover how you can perform a basic installation and migration in less than 1 day. Examine pre- and post-migration considerations and other upfront planning topics to help avoid potential problems. Read more Amazon launches two new Kindles, one with Wi-Fi only News podcast: Network World 360 FBI details worst social networking cyber crime problems WHITE PAPER: Hitachi Hitachi Storage Solutions at Work To address information growth, ensure all patient medical records are preserved properly, and support long term medical research, Tungs' Taichung MetroHarbor Hospital turned to the high quality, reliable storage environment created by Hitachi storage and software. Read Now Cisco, Juniper, Alcatel-Lucent win AT&T IP domain Google crowned 'king of malware' Microsoft wins a Pwnie for failure | ||||||||||
Join us on LinkedIn Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today! Books for you from Microsoft Subnet and Cisco Subnet Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today! SLIDESHOWS Mobile deathmatch: Apple iOS 4 vs. Android 2.2 15 summer vacation ideas for geeks MOST-READ STORIES
| ||||||||||
Do You Tweet? You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com. Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy To contact Network World, please send an e-mail to customer_service@nww.com. Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701 ** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. ** |
Everything related to Computer Security - Security Audits, Security Vulnerabilities, Intrusion Detection, Incident Handling, Forensics and Investigation, Information Security Policies, and a whole lot more.
Search This Blog
Thursday, July 29, 2010
'Unhackable' Android can be hacked
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment