Wednesday, July 27, 2011

'War texting' lets hackers unlock car doors via SMS

Juniper's disappointing quarter not due to switching | IT security's scariest acronym: BYOD, bring your own device

Network World Daily News PM

Forward this to a Friend >>>


'War texting' lets hackers unlock car doors via SMS
Software that lets drivers unlock car doors and even start their vehicles using a mobile phone could let car thieves do the very same things, according to computer security researchers at iSec Partners. Read More


WHITE PAPER: Fujitsu

Midmarket Blades Lead the Pack
A rock solid base for Dynamic Infrastructures. For IT organizations the blade server environment, in combination with virtualization technologies on various levels, is the IT infrastructure of choice to achieve considerable consolidation benefits and ensuring flexible usage of server resources. Read now!

WHITE PAPER: Kaseya

How to Launch a Successful IT Automation Initiative
In this paper, we'll look at IT automation from the corporation's perspective, and discuss the steps organizations should take before launching such an initiative. We'll hear from companies that successfully implemented computer automation platforms, what their early steps were and what they would do differently if they could repeat the process. Read now

Juniper's disappointing quarter not due to switching
No one can blame enterprise switching for Juniper's disappointing second-quarter results. Sales of Juniper's EX switches were up 18% year-over-year, switching overall was up 33%, and enterprise sales were up 9% due to strength in enterprise switching and routing products. Read More

IT security's scariest acronym: BYOD, bring your own device
The torrent of smartphones and tablets entering companies has created some interesting challenges for security managers. The new devices introduce new operating systems, new development environments and new security risks, but no new control. The scariest acronym in security might well be "BYOD," or "bring your own device." As companies develop security and mobility strategies to deal with these devices, it is worth bearing in mind the lessons learned from managing laptops. But it is also worth applying some of the new lessons from smartphones on the laptops, too! Read More

Exploit demo on tap at Black Hat could 'make your water undrinkable'
A demo at Black Hat next week will remotely hack a car alarm, unlock the doors and start the vehicle, but that's just a parlor trick to call attention to a bigger problem that has the Department of Homeland Security on alert. Read More


WHITE PAPER: Citrix Systems

Guide to Workforce Continuity Through Virtualization
Examine this Business Continuity and Disaster Recovery Preparedness Checklist to see how your organization measures up in planning, testing and review. Learn more.

5 Big Tech Players; 5 Bad Android Apps
Using Android isn't all cupcakes and ice cream sandwiches. Here are five of Android's biggest app fails -- from tech companies that should know better, like Facebook and Skype. Read More

CA equips management tools for cloud oversight
CA Technologies has updated a number of its programs to make their users more ready to run some operations in a cloud environment, the company announced Wednesday. Read More

Cloud Security: Will Your Business Data Be Safe In the Cloud?
Is the cloud is a safe place for your critical business data to be? Cloud security consultant Ara Trembly tells you what you need to know and consider before you decide. Read More


WHITE PAPER: Raritan

Data Center Transformations
Build outs, consolidations and acquisitions are large-scale projects that can be very disruptive and require careful planning and implementation to maintain operations. This white paper examines the process and what's required to meet IT goals and objectives and maintain business continuity. Read now!

'Have I reached the party to whom I am speaking?'
Readers of a certain age will recognize the headline as being the signature line of Lilly Tomlin's "Ernestine the telephone operator" on Rowan & Martin's Laugh-in, a groundbreaking sketch comedy that aired from 1968 to 1972. It came to me a few days ago after a head-on collision with Bank of America's customer service department. Read More

I Was Wrong About Self-Encrypting Hard Drives
A few years ago, the EVP of marketing at EMC gave me some grief about analyst predictions. He said something like, "if I bet on your predictions and you're incorrect, I spend millions of dollars on the wrong stuff and lose my job. All you have to do is change your PowerPoint slides and move on." He was right. We analysts are always forecasting what will happen in 3-5 years but its rare that anyone... Read More

iPads to kick Android tablet butt until 2015, report says
Apple iPads will continue to dominate the tablet market for the next couple of years, but market watcher Informa Telecoms & Media expects Android tablets to significantly cut the gap by 2015. Read More

NSF going beyond the TeraGrid to put researchers in touch with more data -- and each other
The National Science Foundation this month formally launched a project called the Extreme Digital Science and Engineering (XSEDE) project that's designed to go beyond the roughly decade-old TeraGrid that has put about 10,000 researchers and scientists in touch with some 2.5 petaflops of high-performance computing resources across the United States. Read More

The new IT guys
Here I am on the tail-end of my first large company talk ever. Sure, I've addressed business units, small groups, etc in meetings, but never before have I ever been called on to give a presentation to 100+ people in a company. And this brings up something I've been meaning to talk about for quite some time. The new age IT guy vs the old age IT guy. Read More



GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Enter here.

SLIDESHOWS

The Geekiest iPad Apps Ever
We scoured the App Store to find the "geekiest" apps out there for the true purveyor of all things geek.

MOST-READ STORIES

  1. Wham Bam Google Ban: No Pseudonyms on Google Plus Profiles
  2. The 5 biggest IT security mistakes
  3. How to implement IPv6 in a Windows environment: an expert guide
  4. Why I was banned on Google+ (and how I redeemed myself)
  5. 15 incredibly useful (and free) Microsoft tools for IT pros
  6. Cisco rival Juniper lands Microsoft's Muglia
  7. Law firm rallies AT&T customers to block T-Mobile merger with lure of cash
  8. 10 technologies that will change the world in the next 10 years
  9. 10 things you shouldn't be able to buy online
  10. The problem with weak passwords and hijacked Hotmail

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment