Friday, December 10, 2010

Mozilla patches 13 Firefox security bugs

  Microsoft slates another monster Patch Tuesday | Google "fixes" another Microsoft product
 
  Network World Daily News AM

Forward this to a Friend >>>


Mozilla patches 13 Firefox security bugs
Mozilla Thursday issued patches for 13 bugs, 11 of which were rated 'critical.' Read More


RESOURCE COMPLIMENTS OF: Xerox

Get Vivid, Lifelike Color with Less Waste.
Xerox® ColorQube® solid ink printers, starting at $699. With 90% less waste and speeds up to 40 ppm, ColorQube® is your perfect solution for affordable color printing. Plus, save up to $300 with a trade-in rebate. Enter to win an Apple® iPad™.

WHITE PAPER: Sybase

Mobility Management for Dummies
In this informative Dummies Guide, you'll learn why mobility management and security is vital to your business. Plus, we'll introduce some of the best solutions and why you need to be prepared for the future—today! Read Now

Microsoft slates another monster Patch Tuesday
Microsoft plans to deliver a record 17 security updates next week to patch 40 vulnerabilities in Windows, Internet Explorer (IE), Office, SharePoint and Exchange. Read More

Google "fixes" another Microsoft product
Google has a habit of cleaning up after Microsoft's mess. At least, that's what Sergey, Larry and Eric would like you to believe. Read More

2011 Innovations Awards Honorees: Computer Hardware
Take a peek at the future of computing. These unique desktops, laptops, components, and cases were honored as part of the 2011 CES Innovations Awards. Read More

7 reasons security pros fail
Dan Lohrmann provides a visual version of his tips for professional success. Read More


WEBCAST: IBM

Cloud as the Next Generation of Service Delivery
Exceptional growth in data is driving a need to transform the delivery of services. Understand the "road map" to transform and learn how IBM adds value at every step from virtualization, consolidation, automation, and ultimately cloud computing. Learn More

Why Whack-a-Mole won't work against the likes of Wikileaks
Security expert Bruce Schneier weighs in with five points about Wikileaks, and the fourth rests upon the fact that any secret is only as secure as the least trusted person who knows it. This has little to do with WikiLeaks. WikiLeaks is just a website. The real story is that "least trusted person" who decided to violate his security clearance and make these cables public. Read More

The story behind the IETF's sFlow standard for switched network monitoring
HP has developed quite a reputation in recent years for being a prime buyer of management software companies, from its $1.6 billion buyout of Opsware in 2007 to its more recent $1.5 billion purchase of ArcSight, a maker of security and information event management products. But HP Labs has also been known to spawn a management start-up or two as well. Read More

Feds to cut 800-plus data centers by 2015
Federal CIO Vivek Kundra yesterday released a 25-point plan for restructuring federal IT operations to boost productivity to private sector levels. Read More

Feds charge two EMC employees with stealing more than $1M in equipment
Two EMC employees were charged with stealing company equipment and distributing it to a local reseller, which then sold it over the Internet. Read More


WHITE PAPER: ArcSight

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center

'Human cloud' of skilled workers growing in importance
Online labor by independent "cloud" workers probably represents nearly US$1 billion per year in earnings in the U.S., said Elance President and CEO Fabio Rosati, who expects the federal government to consider gathering statistics about the sector beginning next year. Read More

Teen arrested for selling Call of Duty DDoS tool
A teenager in Manchester has been arrested after being caught selling a 'booting tool' used to attack and kick players of the hugely popular Call of Duty online game. Read More

Has progress been made in fighting DDoS attacks?
As the distributed denial-of-service attacks spawned by this week's WikiLeaks events continue, network operators are discussing what progress, if any, has been made over the past decade to detect and thwart DoS attacks. Read More

Christmas concert performed entirely on iOS devices
It's nothing out of the ordinary for a band to play Christmas songs during the holiday season, but when those songs are performed entirely on iPads and iPhones, well, that gets our attention. Read More

Facebook's Zuckerberg vows to donate his wealth
Mark Zuckerberg, the billionaire behind Facebook, has pledged to donate a sizable chunk of his fortune to charity. Read More

 
 
 

FILL OUT A SURVEY, GET REWARDED
Get a free Starbucks gift card for participating in a Network World survey about application performance management best practices. Research firm NetForecast is surveying enterprises about APM practices for an upcoming Network World article. The first 100 participants will receive a $5 Starbucks gift card. Click here.

DECEMBER GOODIES FROM THE SUBNETS
SharePoint 2010 power user training for three people from Webucator, plus a brand new iPad available from Microsoft Subnet. Five massive libraries on CCNP, security, NX-OS up for grabs on Cisco Subnet. Enter to win!

SLIDESHOWS

Top IT Turkeys of 2010
Thanksgiving is a time for giving thanks for all of the people and things we love, to cherish what's most important to us. But that's for another slideshow. This one's all about taunting the companies, products and people who most resembled a turkey over the last year. So cut me a hockey-puck-shaped slice of jellied cranberry sauce and read on.

Cool Yule favorites: 15 techie gifts we like
Ho Ho Ho, it's time again to get our holiday wish lists together. Here are our 15 favorite products from the 140+ products submitted and tested in this year's Cool Yule Tools holiday gift guide.

MOST-READ STORIES

  1. Fix to Chinese Internet traffic hijack due in January
  2. MasterCard website partially frozen by DDOS attack
  3. VMware to virtualize Android smartphones for business users
  4. Porn site visitors could score a payday for theft
  5. China telecom operator denies hijacking Internet traffic
  6. WikiLeaks founder praised by Pentagon Papers exposer
  7. Google's Chrome OS is no Windows killer just yet, analyst says
  8. What it's like to get hit with a DDoS attack
  9. Test: Best NAS boxes for less than $1,000
  10. 31 "How-to" resources you might have missed
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment