Search This Blog

Thursday, July 23, 2009

Flash vulnerability allows attack via malicious PDF; 20 must-see ComicCon panels

20 must-see ComicCon panels; After report questions service, Zer01 parent strips Web site
Network World logo

Daily News AM Alert

NetworkWorld.com | Update Your Profile


Sponsored by IBM NWW
rule

Distinguish your Business Through Superior Service
Distinguish your business from competitors by delivering superior service. Download this whitepaper today and discover how top-flight service management can deliver a world-class customer experience.

rule

Spotlight Story
Adobe Flash vulnerability allows attack via malicious PDF file

Symantec Wednesday said it has identified a PDF file that exploits a previously unknown vulnerability in an Adobe Flash multi-media component. Read full story

Related News:

20 must-see ComicCon panels
What to look for (or what you're missing) at this week's Geek Mecca in San Diego

After report questions service, Zer01 parent strips Web site
Two days after a report cast doubt on Zer01 Mobile's business, its parent company has stripped its Web site down to only basic information.

10 biggest network venture capital deals from Q2
Software-as-a-service, flash storage, security and semiconductors dominate the top 10 network venture capital deals in Q2, according to the MoneyTree Report.

A look at cloud computing's dark lining
Unless you've been living in a cave all summer like one of my friends (it's in Finland, he's an artistic genius) you've probably heard the buzz about cloud computing.

Is the Palm Pre suffering from high return rates?
The Palm Pre might be subject to excessively high return rates, according to an equities market researcher. But then again it might not.

Outsourcers struggle as recession wears on
TPI reports that fewer IT services contracts were signed in the first half of 2009, resulting in significant revenue declines for outsourcers.

iPhone app predicts IPv4 doomsday
If you're the kind of person who walks down the street worrying about the depletion of IPv4 addresses, the iPhone can now tell you how long you have until that happens.

Channel says Cisco in for a positive quarter
Cisco's channel reports a Q4 in line or slightly ahead of expectations, according to a bulletin issued this week by Oppenheimer & Co. Oppenheimer queried 31 channel partners in the US and Europe to determine how Cisco would end fiscal 2009 and begin fiscal 2010.

The New Cisco Net Management Cert – But it's not from Cisco
When most people think networking products, Cisco's on the list, often at the top. But when most people think network management products, Cisco may be on the list, but other vendors may play a more important role. This same thought translates to the Cisco cert space.

Why HTML 5 is important for mobile development
With the effective cancellation of the W3C's XHTML2 project, HTML 5 emerges as the foundation for future Web development.

DNS security, net neutrality up for debate at IETF meeting
Standards body IETF will tackle the Internet's toughest problems, including DNS security, IPv6 adoption and network neutrality, at its Stockholm meeting next week.

Apple takes legal heel off throat of wiki operator
A wiki operator who was browbeaten by Apple's legal team into removing posts about circumventing the company's music-playback software tells me he is relieved that the iTunes proprietor has changed its tune and he'll be able to restore the disputed pages.

July Giveaways
Cisco Subnet is giving away 15 copies each of books on Enterprise Web 2.0 and Building a Greener Data Center; Microsoft Subnet is giving away training from New Horizons to one lucky reader and 15 copies of Microsoft SQL Server 2008 Reporting Services Unleashed. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages. Deadline for entries July 31.

Network World on Twitter? You bet we are


Botnet boom
BotnetsThe number of botnets has grown from about 1,500 two years ago to 3,500 today.

Watch this space
IT quizHere are 11 security companies to watch.

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved.
Read Now


 

July 23, 2009

TOP STORIES | MOST DUGG STORIES

  1. Microsoft stuns Linux world, submits source code for kernel
  2. Five technologies Iran is using to censor the Web
  3. Adobe admits users vulnerable after downloading Reader
  4. ZerO1's mobile offer may be too good to be true
  5. Why would Microsoft patent a 'butt hinge with butt straps?'
  6. Google Earth now takes you to the moon
  7. Avaya set to buy Nortel enterprise business for $475 million
  8. IBM strikes OEM deal to resell Juniper Ethernet switches, routers
  9. Juniper pounds spike into Cisco's heart
  10. IEEE 802.11n heads for a finish in September

Next-Generation Data Centers
IT transformation begins at the data center, as enterprises embrace technologies such as virtualization and cloud computing to build adaptable, flexible and highly efficient infrastructures capable of handling today's business demands.
Read this Guide.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: