Search This Blog

Tuesday, February 22, 2011

Beware: Memory scraping malware wants your private data

Dumbest tech marketing stunts of all time | The Creepy and Amazing World of Computer Implants

Network World Daily News PM

Forward this to a Friend >>>


Memory scraping malware goes after encrypted private information
What's "pervasive memory scraping" and why is it considered by SANS Institute security researchers to be among the most dangerous attack techniques likely to be used in coming the coming year? Read More


RESOURCE COMPLIMENTS OF: Citrix XenServer

Download Free XenServer
XenServer is the only enterprise-ready, cloud-proven virtualization platform you don't have to pay for. With live migration, centralized multi-server management, and shared storage support, you can't afford not to try it! Click to continue

WHITE PAPER: Brocade

The Distinction between FBC and FBI
A fabric-based computing architecture can support virtualization and cloud computing. Distinguishing between fabric-based computers and fabric-based data centers is critical to select the best technologies and products. Read this paper to learn more. Read now!

Dumbest tech marketing stunts of all time
Two Dell employees last week put the maxim "There's no such thing as bad publicity" to the test after a hostage-themed marketing stunt focused on the Dell Streak tablet went about as badly as you'd expect. Read More

The Creepy and Amazing World of Computer Implants
Cameras embedded in human skulls. Chips that translate thoughts into actions. Contact lenses that diagnose eye diseases. These computer implants will blow your mind. Read More

Avaya extends 'private cloud' capabilities to campus networks
Avaya is taking its data center architecture to the enterprise campus, with the goal of creating "private clouds." Read More


WHITE PAPER: Riverbed

A New Level of Network Analysis
In this white paper, IDC analyzes the ROI that customers can expect from Riverbed Cascade, based on interviews with Cascade customers. Additionally, IDC lays out the business case for proactively managing network and application performance. Get the visibility you need to achieve your IT objectives. Read Now.

Iron Mountain wins email archiving test
In the opening round of this two-part series, we tested seven leading e-mail archiving products. This time, we're applying the same test methodology to four additional products. Read More

Smartphone Security Threats Overdramatized, Experts Say
I was sitting in the middle of one of the most security conscious crowds you'd ever come across--about 200 computer security professionals listening to a high-powered panel on mobile security threats at the RSA Conference in San Francisco last week. Read More

Egyptian father names newborn daughter Facebook
Someday she'll understand ... or notFrom the "Seemed Like a Good Idea at the Time Department" comes news that an Egyptian couple has chosen to honor the role of social networking in that country's recent political uprising by naming their newly arrived baby daughter Facebook. CNN reports: Gamal Ibrahim, a 20-something, gave his daughter the name "to express his joy at the achievements made by the January 25 youth," according to a report... Read More


WHITE PAPER: IBM

Using BPM and Business Analytics Together
How do organizations become agile enough to proactively respond to all this change? They require processes, analytics and structures that give them real-time situational awareness into occurrences both inside and outside the organization. Read now!

First CDMA Windows Phone 7 handset expected from Sprint this week
The next Windows Phone 7 handset, and the first for CDMA networks, is widely expected to be available on Sprint's network on Thursday: the HTC 7 Pro, with a sliding horizontal keyboard and a tilting 3.6-inch touch screen. Read More

Next iPhone and iPad may be delayed 2 to 3 months
The eagerly awaited new iPhone and iPad face a range of supply chain and production issues that may delay their introduction by two to three months, according to analysts at investment firms. Read More

Can anyone afford an IBM Watson supercomputer? (Yes)
While Watson certainly impressed the nation with its sweeping victory on the game show Jeopardy last week, the medical community -- which IBM hopes will be first to use the technology -- may eventually become even more impressed with its affordability. Read More

Rising oil prices could push up price of electronics, R&D
Rising world oil prices threaten to raise the cost of consumer electronics and slow development by forcing Asian manufacturers to spend more on transportation and raw materials, regional economists say. Read More

The iPad data dilemma: Where cloud storage can help
Tablets and cloud storage seem like a marriage made in heaven, but it takes third-party apps to bring them together Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a Windows 7 Enterprise Technician class for three people. From Cisco Subnet: 15 copies of AAA Identity Management Security. Enter here.

SLIDESHOWS

When IT professionals cheat
We asked 200 IT professionals to tell us how often IT workers cheat on certification exams, buy fake gear or illegally share software. Here are the results.

Tech 'firsts' that made a President's day
From the first presidential steamboat ride to the introduction of electricity in the White House to Obama's famous BlackBerry, our nation's commanders in chief have always enjoyed the privilege of being exposed to technology's cutting edge -- even if they haven't always embraced the opportunities.

MOST-READ STORIES

  1. Anonymous: It's a trap!
  2. Mobile heavyweights seek to finalize 1Gbps mobile standard
  3. The iPad data dilemma: Where cloud storage can help
  4. iPad could get Intel's superfast Light Peak connector
  5. Disk or tape? How about both
  6. How IT pros cheat on certification exams
  7. Cerf: Future of Internet doesn't include an IPv7
  8. Cisco grapples with transition as routers and switches lag
  9. Cisco's moment of truth
  10. Why you freak out over Facebook

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: