Search This Blog

Tuesday, August 25, 2009

Cisco wireless LAN vulnerability could open 'back door'; Personal spy gear: Is it ethical? Is it legal?

News podcast: Network World 360; Personal spy gear: Is it ethical? Is it legal?
Network World logo

Daily News PM Alert

NetworkWorld.com | Update Your Profile


Sponsored by HP_Avnet
rule

Unifying Management Systems for Deep Savings
To deliver the availability and performance the business demands, network management teams need to optimize fault management, unify fault and performance management, automate change and configuration management, implement run-book automation, and deploy a configuration management system based on a federated CMDB. This integrated approach is called automated network lifecycle management and is outlined in this white paper.

Read Now

rule

Spotlight Story
Cisco wireless LAN vulnerability could open 'back door'

Some wireless access points from Cisco Systems have a vulnerability that could allow a hacker to redirect traffic outside the enterprise or potentially gain access to an entire corporate network, a security company said. Read full story

Related News:

News podcast: Network World 360
A security company said today that some wireless access points from Cisco have a vulnerability that could let hackers redirect traffic outside the enterprise, or potentially gain access to an entire corporate network. Also, Twitter is jumping on the geolocation bandwagon, with plans to let users geocode their posts and make the information accessible both on the main Twitter site and through external applications. (5:41)

Personal spy gear: Is it ethical? Is it legal?
From disguised video security cams to GPS tracking loggers, personal security is going high-tech. But these gadgets bring up a host of sticky ethical and legal questions.

Career advice: High-tech, healthcare best choices for college students
College students should forget about becoming a lawyer and focus their studies on computer science, engineering and healthcare, HR executives say.

How to minimize the risk of illicit credit card capturing
Illegally capturing customer payment card numbers, or skimming, is a huge threat to merchants, according to an upcoming report on the criminal activity.

10GBase-T coming to your motherboard
Solarflare this week introduced 10GBase-T LAN-on-motherboard chips, bringing copper-based 10 Gigabit Ethernet to new territory.

More smartphones than PCs by 2011
Smartphone sales will surpass worldwide PC sales by the end of 2011, says a new report. The report, by RBC analyst Mike Abramsky, estimates that by that time shipments of both will be approaching 400 million a year.

How to control your SAN
Ron talks with Rick Clark, CEO of Aptare, about the challenges of SANs growing at an exponential rate while the funding to manage them doesn't keep pace. Clark discusses how to deal with file deduplication, remote backup of SANs and a few other topics of interest for those dealing one or more SANs in their data center. (27:04)

Snow Leopard, More Snore Than Snarl
There is little reason for most users to upgrade to Apple's next-generation Snow Leopard operating system this Friday, but at least the price is reasonable. Or is it?

Rackspace debuts 'Cloud Tools' portal
Cloud infrastructure provider Rackspace on Tuesday announced a new portal that will help showcase and organize tools and applications built by its partners and independent developers.

10 reasons you shouldn't believe in UFOs
Former Arizona Gov. Fife Symington and his band of others are out beating the drums so loudly about UFOs that they might be heard on another planet. I just watched this Larry King interview ... and the stories these men tell are remarkable; just not remarkable enough to convert me from a lifelong skeptic into a believer.

August Giveaways
Cisco Subnet is giving away training from Global Knowledge and 15 copies of Practical Intrusion Analysis; Microsoft Subnet is giving away training from Global Knowledge and 15 copies of SCCM 2007 Unleashed. Google Subnet is giving away 15 copies of Web Geek's Guide to Google Chrome. Entry forms can be found on the Cisco Subnet, Microsoft Subnet and Google Subnet home pages. Deadline for entries is August 31.

Network World on Twitter? You bet we are


10 sports technologies to love, 5 to hate
Sports technologiesMany technologies help fans enjoy sports. Others just annoy.

Apple disasters
Apple disastersApple has enjoyed huge success with the iPod and iPhone, but Apple has had a number of commercial flops, too.

Independent Test Results: Citrix vs. F5
Latency is an important metric when measuring Web applications. See the benchmark results from independent tester, Tolly, to learn how Citrix fared against F5 in a wide range of scenarios.
Learn More


IBM ISS X-Force Threat and Risk Report
Read this Trend and Risk report from IBM® ISS X-Force® to learn statistical information about all aspects of threats that affect Internet security, including software vulnerabilities and public exploitation, malware, spam, phishing, web-based threats, and general cyber criminal activity.
Read Now

 

August 25, 2009

TOP STORIES | MOST DUGG STORIES

  1. 12 words you can never say in the office
  2. Air Force, NASA fire environmentally friendly rocket
  3. Judge overturns 2007 Unix copyright decision
  4. Where not to find an IT job
  5. Obsolete technology: 40 big losers
  6. How projects really work
  7. Scientists capture mysterious huge lightning flashes
  8. How to run your IT department into the ground
  9. New Data Center: Virtualization
  10. Cisco Wi-Fi vulnerability could open 'back door'

The Top Five Ways IT Organizations Can Help Companies Survive a Tough Economy
When times are tough, companies need to home in on those activities that help them operate more efficiently and do more with less. They need to quickly adapt and respond to competitive threats and fluctuating market conditions. They need to seize the opportunities that will help them survive the down cycle and emerge stronger than before. This white paper discusses the five key initiatives that companies will be focused on over the next 12 to 24 months.
Learn more.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: