Search This Blog

Wednesday, December 16, 2009

AT&T lashes out at Fake Steve Jobs' network threat; Rogue antivirus lurks behind Google Doodle searches

Rogue antivirus lurks behind Google Doodle searches; 2009 Holiday Laptop Gift Guide
Network World logo

Daily News PM Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by Sprint
rule

Effectively Integrating Wireline and Wireless Services for Seamless Communication
Respected consulting firm IDC examines the benefits, challenges and the choices available today that will allow you to successfully bridge your wireless and wireline services. Find out how you can simplify your communications strategy, save money and create a transparent environment.

Learn more

rule

Spotlight Story
AT&T lashes out at Fake Steve Jobs' network knock-out threat

Fake Steve Jobs is taking heat from AT&T over his protest campaign to shut down the carrier's 3G network this Friday. Read full story

Related News:

Rogue antivirus lurks behind Google Doodle searches
In Esperanto the word is "malica." It means malicious and it's the best way of describing many of the search results Google visitors got Tuesday when the clicked on Google's front-page Doodle sketch, dedicated to Esperanto's creator.

2009 Holiday Laptop Gift Guide
Whether your tastes run to business or pleasure, whether you're a jet-setter or a multimedia fiend, we have some great-looking laptops for you (or for someone you want to spoil) this year.

McDonald's to offer free, unlimited Wi-Fi
McDonald's restaurants may soon be the easiest spot to find free Wi-Fi and browse the Web as long as you like.

Microsoft legally promises not to sue open source developers
As part of the agreement Microsoft has struck with the European Commission to offer a ballet screen for browsers, Microsoft has issued what it calls the "Patent Pledge for Open Source Developers." The pledge tells open source developers that Microsoft won't sue them for developing open source software for its flagship products as long as they are not selling their software.

FTC files formal antitrust complaint against Intel
The U.S. Federal Trade Commission has filed an antitrust-related lawsuit against Intel, charging the world's largest computer chip maker with illegally using its dominant market position to stifle competition and strengthen its monopoly for a decade.

HP products target hybrid cloud computing
HP Wednesday announced products it says will help enterprise IT and service providers ease the adoption of internal cloud computing setups as well as public cloud services.

News podcast: Network World 360
The Federal Trade Commission has filed an antitrust lawsuit against Intel, charging the world's largest computer chip maker with illegally using its dominant market position to stifle competition and strengthen its monopoly for a decade. Also, server and storage vendors suffered painful revenue declines throughout 2009, but the IT hardware markets are starting to show signs of life and are in position for a small rebound in 2010. (5:53)

Top 5 Insider Attacks of 2009
This year saw an increasing number of insider attacks and data breaches that created some high-profile news reports. Keith Shaw discusses the top types of attacks with Robert Grapes, chief technologist at Cloakware, as well as what IT can do to prevent them at their enterprises. (16:42)

They Own What? Nine Tech Patent and Trademark Oddities
"Everything that can be invented has been invented." Legend has it that U.S. Patent Commissioner Charles Duell wrote that in a letter to President William McKinley in 1899.

Internet habit? Dependency? Addiction? Pop psychology?
The popular press is full of articles braying news about Internet addiction; try typing "Internet addiction" into the search field of your favorite search engine and start browsing. A Google search in mid-December brought up 768,000 English, French and German pages on the topic.

Amazon's "Virtual Private Cloud" enters unlimited beta
­Amazon's "Virtual Private Cloud," a cloud computing offering that is more secure than the company's previous services, is now available to the general public in an open beta trial.Amazon unveiled the Virtual Private Cloud (VPC) in August but made it available only to a portion of its customer base.

Military aircraft are melting shipdecks?
I have to wonder why the Navy in particular didn't see this one coming. Military scientists at Defense Advanced Research Projects Agency (DARPA) this week said they was looking for technology the military can use to stop aircraft landing decks on aircraft carriers and other ships from buckling and melting.

Today from the Subnet communities

On Cisco Subnet: Top 10 areas that CIOs needs to focus on for 2010 and VARs lining up for UCS, VBlock; On Microsoft Subnet Microsoft admits it copied Plurk, shuts down Juku: On Google Subnet: 10 best Chrome extensions

Network World on Twitter? You bet we are


Decade in tech
Ethernet everywhereHere is a quiz on the most important or quirkiest tech stories to hit the front pages over the first 10 years of the 2000s.

Cool Yule Tools
Windows 7Best picks from this year and a look back at 10 years of tech toys and gadgety gifts.

Secure in 15 - Start with Daily Practices
Get the Secure in 15 toolkit starting with the "15 Minutes Month-at-a-Glance" calendar. McAfee will send you additional tools and tricks to stay protected around the clock.
Click here to learn more.


 

December 16, 2009

MOST-READ STORIES

  1. Bank's antifraud tactics stun security expert
  2. When ISPs turn on meters expect "unexpected" traffic
  3. 10 wacky USB devices
  4. Watch out Microsoft: GNOME is poised to have a killer 2010
  5. Rogue antivirus lurks behind Google Doodle searches
  6. Ethernet switch cheat sheet
  7. Apple's top 10 biggest stories in 2009
  8. Zero-day vulnerability threatens Adobe users
  9. Hackers are defeating tough authentication, Gartner warns
  10. Chinese zodiac accurately predicts yearly cybercrime trends

Vulnerability Management Checklist
Discover the 12 key decision points you need to consider when choosing a vulnerability management solution. This checklist walks you step-by-step through critical questions to ensure you select the solution that will best protect your network and data.
Learn more now.



EMO Labs: Better Sound Through Innovation at DEMOfall 09

EMO Labs' Invisible Speaker innovation takes People's Choice Award top honors at DEMO conference.
Watch EMO Labs product launch.


 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments: