Search This Blog

Monday, August 02, 2010

Hacker snoops on cell phones in demo

12 Top Spy Gadgets | How to steal corporate secrets in 20 minutes: Ask

Network World Daily News AM

Forward this to a Friend >>>


Hacker snoops on cell phones in demo
Despite concerns that federal authorities might fine or arrest him, hacker Chris Paget went ahead with a live demonstration of mobile phone interception at the Defcon hacking conference Saturday. Read More


REPORT: Citrix

Gartner Research Note: Load Balancers are Dead
Gartner Research Note "Load Balancers are Dead: Time to Focus on Application Delivery" helps you understand how to replace your basic load balancing technology and focus on getting the highest availability, performance and security for your web apps. Includes key recommendations you can use. Read now!

WHITE PAPER: Riverbed

Address Real-Time Application Performance
IDC interviewed customers using Riverbed Cascade solution. Their analysis includes hard dollar ROI and benefits of the following features: • Application-level view of networks and servers • Visibility into end-to-end application delivery dependencies • Network behavioral analysis • Metrics to track performance SLAs Read now!

12 Top Spy Gadgets
Spy gear for your inner secret agent. These cool (and possibly useful) gadgets would dazzle James Bond! Read More

How to steal corporate secrets in 20 minutes: Ask
A few companies in the Fortune 500 need to upgrade their Web browsers. And while they're at it, a little in-house training on social engineering wouldn't be a bad idea, either. Read More

Speed Test - iPhone, iPhone 3G, iPhone 3GS, and the iPhone 4
As this video shows, the difference in speed between devices is remarkable from one generation to the next. Read More


WHITE PAPER: Riverbed

Forrester: IT Platform to Optimize and Consolidate
In this report, Forrester investigates the reasons why you should consider WAN optimization solutions as the best way to gain better IT performance, cost savings, and greater flexibility for your business. And it's also a smart network improvement investment over the long-term. Get the facts about WAN optimization in this study. Read now!

FCC concerned over DefCon mobile hacking talk
Chris Paget wants to demonstrate how easy it is to snoop in on mobile-phone conversations. The question is: Will the federal authorities allow it? Read More

Anatomy of a Cisco data center convert
Cisco almost didn't make the cut. NightHawk Radiology Services was ready to hand its data center consolidation project to another vendor until a facility leasing issue delayed its decision. Read More

Windows 7 Tablets: Just Say No, Microsoft
Microsoft is busy at work on a new tablet computer design, a product that may arrive from one or more of its hardware partners in "not a heck of a long time," CEO Steve Ballmer told analysts on Thursday. Read More


REPORT: Radiant Logic, Inc

Download Latest Gartner Report on IdM
Today's centralized identity infrastructure can't keep up with tomorrow's increasingly federated demands, from user-centric identity, to Identity-as-a-Service, and the cloud. In "The Emerging Architecture of Identity Management," Gartner outlines a vision for tomorrow's identity landscape--one with virtualization at its core. Download the report--free!

VA set to spend billions on IT
The U.S. Veterans Administration is making upward of $12 billion in IT contracts available to businesses over the next five years, as part of an effort to modernize its operations. Read More

Dragon Naturally Speaking Goes to 11 [video]
I had the chance earlier in the week to visit the Burlington, Mass., headquarters of Nuance Communications, which makes the Dragon Naturally Speaking software. The company this week announced version 11 of its software ($100, available very soon), with performance boosts, accuracy improvements and some user interface changes, among other new features. Read More

Open Source IDS Wars: You Were There
Over the last couple of weeks I have been following all of the Snort-Suricata, Roesch-Jonkmann back and forth. If you are not familiar with the particulars of this latest incident you can read about them in Ellen Messmer's article and my fellow open source subnet blogger, Ben Whaley's column. Read More

It's time to virtualize Microsoft Exchange (but not with Hyper-V)
Microsoft isn't accustomed to being in second place in any market, but that's the situation it has had to accept as it challenges VMware for supremacy in the x86 virtualization world. Microsoft has undoubtedly made significant progress in the last couple of years, bolstering its virtualization and management capabilities with Hyper-V and System Center Virtual Machine Manager. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

SLIDESHOWS

Mobile deathmatch: Apple iOS 4 vs. Android 2.2
Apple's iOS has been wowing users for four years in the iPhone and now the iPad. Available in smartphones and now tablets from various vendors going on two years, Google's Android has proven itself to be a strong contender that has the only real chance to surpass iOS.

15 summer vacation ideas for geeks
From Star Trek and Space Camp to baseball minutiae, vintage video games, anime, pirates, Harry Potter and They Might Be Giants, there's a vacation option for any type of geek this summer.

MOST-READ STORIES

  1. 'Unhackable' Android phone can be hacked
  2. ATM hack gives cash on demand
  3. Black Hat gets its video feed hacked
  4. Happy SysAdmin Day (despite the pay)
  5. FBI rings organizers over Defcon contest
  6. WPA2 vulnerability found
  7. Microsoft's 2010 software 'most complicated lock-in decision in years'
  8. Microsoft: Gmail like a Jaguar with 'vinyl seats'
  9. Bad guys could read RFID passports at 217 feet, maybe more
  10. New Zealand pizza lovers suffer information theft from Hell

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: