Friday, October 01, 2010

Is Stuxnet an Israeli-invented attack against Iran?

HP Spins CEO Carousel, Picks Wrong Horse in Apotheker | 7 ways to exercise without leaving your desk

Network World Daily News AM

Forward this to a Friend >>>


Is Stuxnet an Israeli-invented attack against Iran?
Was Stuxnet, a sophisticated piece of malware designed to attack industrial control systems (ICS), secretly invented by Israel to attack Iran's industrial controls systems? Read More


WHITE PAPER: NetApp

ESG Analyst Report: "Changing the Way You Purchase Storage"
Most organizations are still buying storage based on outmoded ways of thinking. Find out why it's time to modernize your approach and the key criteria you need to consider before making your next IT investment. Read now!

WHITE PAPER: Xerox

Selecting a Managed Print Services Vendor
This IDC paper offers guidance on the MPS market and key characteristics to consider when selecting a provider. Learn More.

HP Spins CEO Carousel, Picks Wrong Horse in Apotheker
Nothing miraculous has transformed Leo Apotheker since his old school ways failed to energize SAP employees or customers during his brief stint as CEO. Apotheker is not the best choice--even if HP has designs on enterprise software or SAP itself. Read More

7 ways to exercise without leaving your desk
Turn sedentary work time into a workout opportunity. Read More

Zeus Trojan bust reveals sophisticated 'money mules' operation in U.S.
Court documents released on Thursday related to indictments over a massive international financial cybercrime operation provide a fascinating -- if scary -- glimpse into how the crooks operated within the U.S. Read More

Fantasy Football killing productivity? Pure fantasy
Good news, fantasy sports geeks: You probably won't get fired for shaking up your running back rotation during office hours. Read More


WHITE PAPER: ArcSight

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center

With Apotheker at helm, HP signals new direction
Initial reactions to HP's appointment of Leo Apotheker as its new CEO has been double-takes. But what's clear from the move is that Oracle is in its sights. Read More

BoA is holding my online bank accounts hostage
OK, fine, "hostage" may be a bit of hyperbole. However, right at this moment, Bank of America is presenting me with a take-it-or-leave-it proposition: Agree to our "Electronic Communications Disclosure" - all 2,127 words; three densely packed printed pages - or kiss your online banking privileges good-bye. Read More

LTE leap suits a small carrier, MetroPCS chief says
MetroPCS, with a customer base of just 7.6 million, doesn't seem the most likely mobile operator to launch the first commercial LTE networks in the U.S., but its small size actually was one of the reasons the carrier jumped on the new technology, MetroPCS Chief Operating Officer Thomas Keys said Thursday. Read More

Google gives URL shortener its own site, touts performance and security
URL shorteners have become a ubiquitous presence on the web, largely due to the rise of Twitter. Tinyurl, Bit.ly and the like have come along to make those ugly long URLs look nice and neat in your 140-character Twitter posts. Since they've become so widely used, it only makes sense that the biggest Internet companies would make their own. Read More


WHITE PAPER: Cisco

Considering Cloud-Based Security?
This technology dossier contains four papers that address security considerations in cloud computing. It includes IDG Research results on what IT managers have to say about cloud security, executive viewpoints on blending cloud solutions to optimize security, and a strategy paper that addresses protecting data. Read now!

US lawmakers want to ban many e-waste exports
Two U.S. lawmakers have introduced legislation that would ban the export of broken electronic waste products from the country, in an effort to reduce the recycling of dangerous materials in unsafe overseas facilities. Read More

Microsoft pushes Windows Web bug patch to everyone
Microsoft today released its latest emergency patch to its Windows Update distribution service, making good on a promise earlier this week. Read More

Google reportedly ready to unveil JPEG alternative
Google is reportedly set to announce that it has developed a JPEG alternative that should speed up the Web. Read More

Five reasons why legislation to limit outsourcing fails
Computerworld lists five reasons why proposals and legislation aimed at limiting the outsourcing of U.S. jobs are likely to fail. Read More

Street View Reaches the South Pole: Will Penguins Complain?
It's official: Google's Street View has now officially reached all seven continents. Read More

Raytheon unveils the XOS2 robotic suit
Raytheon unveiled its second generation Exoskeleton or XOS2 robotic suit this week. The suit gives the wearer superhuman strength and this latest version is lighter, faster and stronger than its predecessor. It also uses 50 percent less power. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

SLIDESHOWS

Meet RIM's BlackBerry PlayBook
Research in Motions heats up the tablet wars with BlackBerry PlayBook that aims to outshine Apple and Samsung when it comes to business appeal.

A brief history of Android
In this slideshow we'll take you back in time to trace the origins of the Android operating system and show how it rose rapidly to become one of the top operating systems in the mobile world.

MOST-READ STORIES

  1. Red Hat urges patent office to deny most software patents
  2. Many Android apps leak user privacy data
  3. Zeus botnet bank thieves were careless with own security
  4. Professionals: Don't use Facebook and Twitter
  5. Android software piracy rampant despite Google's efforts to curb
  6. Cisco eats its own IPv6 dog food
  7. How to make your cable company hate you
  8. Texting while driving bans don't work, study finds
  9. Fed's IPv6 plan called a "game changer"
  10. The shape of threats to come

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment