Search This Blog

Wednesday, December 22, 2010

Will 2011 be the year of mobile malware?

Star Trek anyone? US sets out to build photon-based optical networks | The weirdest, wackiest and stupidest sci/tech stories of 2010

Network World Security


TOP STORY: Will 2011 be the year of mobile malware?
Perhaps one of the most common predictions of the last six years has been that mobile malicious software will suddenly proliferate, driven by widespread adoption of smartphones with advanced OSes. None of those prognostications have really come to fruition, but it's likely that the coming year will bring a host of new malicious applications. Read More

WHITE PAPER: The Three Ps of Evaluating Managed Network Services (Qwest)
To reduce costs and keep IT resources focused on the core business, more organizations are choosing to outsource network management. To deliver on this promise, it's essential to choose the right service provider. This in-depth report explores the key considerations, including solution portfolio, partnerships and processes. Read now!

Star Trek anyone? US sets out to build photon-based optical networks
Raytheon BBN Technologies gets $2.1M to begin developing photon technology  Read More

The weirdest, wackiest and stupidest sci/tech stories of 2010
From exploding Droids to robotic pack mules and Apple weirdness it was a wacky year Read More

WHITE PAPER: Prepare IT for Growth (IBM)
The need has never been so great to balance evolving IT Services with reduced IT budgets. Learn to position your organization for growth in this uncertain business climate. Read Now

Santa Claus Placed On Watchlist As Possible Terrorist
You won't believe who was placed on a watchlist this time -- Santa Claus! After St. Nick balked at a TSA grope down, authorities took him in for questioning regarding possible terrorist activities.Time and again, we've seen innocent people or peace groups improperly spied upon and added to terrorist watchlists. Well you won't believe who was placed on a watchlist this time -- Santa Claus! Read More

Cloud Security Alliance updates controls matrix
The Cloud Security Alliance's matrix is a controls framework that gives a detailed understanding of security concepts and principles that are aligned to the CSA's 13 domains. Read More

WHITE PAPER: Data Loss Prevention: Keep Sensitive Data-In-Motion Safe (Watchguard)
Though revolutionary to business, new web applications have also increased security risks, hurt productivity, and eaten up bandwidth. Read this white paper to find out how WatchGuard Application Control lets you take back control of your network keeping more than 1,500 applications – like Facebook, Skype, YouTube - in check. Read now!

'Do Not Track' Coming to Firefox 4
Hard on the heels of Microsoft's decision to offer "do not track" functionality in its upcoming Internet Explorer 9 browser comes word that Mozilla is planning a similar move for its Firefox 4. Read More

Six Password Security Tips to Learn from Gawker Hack
The Germans have a word for it: Schadenfreude, taking pleasure in someone else's misfortune. And I have to admit, I did a feel a twinge of satisfaction when Gawker, one of the snarkiest and most self-satisfied collection of sites on the Web, was hacked. But I do worry about the 1.2 million people whose passwords were stolen and posted on the Web for any moderately skilled bad guy to crack and use. Read More

WHITE PAPER: The Antidote to DNS Cache Poisoning and Other DNS Attacks (F5 Networks)
Domain Name System (DNS) provides one of the most basic but critical functions on the Internet. If DNS isn't working, then your business likely isn't either. Secure your business and web presence with Domain Name System Security Extensions (DNSSEC). Learn more!

Researchers create botnet to learn how it works
An at-scale botnet emulation helps a team of researchers in Canada and France learn more about how armies of zombie computers operate Read More

What does 2011 hold for identity management?
Today we'll take one more look at some predictions for identity management and identity and access management (IAM) in the coming year. Read More

iSnitching & Foursquare Door Hacking. What Could Possibly Go Wrong?
An app for iSnitches and a Foursquare hack to unlock your front door...Oh boy, what could possibly go wrong with either of these?A couple of new products jumped out at me this week, an iPhone app to help citizens become iSnitches and a Foursquare hack that can unlock your front door. Oh boy, no potential for abuse there. What could possibly go wrong with either of these? Read More


FILL OUT A SURVEY, GET REWARDED
Get a free Starbucks gift card for participating in a Network World survey about application performance management best practices. Research firm NetForecast is surveying enterprises about APM practices for an upcoming Network World article. The first 100 participants will receive a $5 Starbucks gift card. Click here.

DECEMBER GOODIES FROM THE SUBNETS
SharePoint 2010 power user training for three people from Webucator, plus a brand new iPad available from Microsoft Subnet. Five massive libraries on CCNP, security, NX-OS up for grabs on Cisco Subnet. Enter to win!

SLIDESHOWS

Best and worst celebrity technology moments of 2010
Here's a look back at the year's most memorable – for better or worse – celebrity moments in technology.

Top 15 Holiday Deals on Notebooks, Netbooks, and Desktops
Black Friday is gone, Cyber Monday is history, and Cyber Week is over, but the deals are still around--if you know where to look. The holiday shopping season is in full swing, and retailers are offering great computer discounts to fit everyone's budget. Take a look inside to find netbooks for $300, desktops with widescreen monitors for under $600, and 15-inch laptops starting at $400. Check it out.

MOST-READ STORIES

  1. U.S. military strong-arming IT industry on IPv6
  2. The weirdest, wackiest and stupidest sci/tech stories of 2010
  3. Photographers are not terrorists
  4. Downloads lighten your laptop
  5. Cisco eschews cloud services - for now
  6. What's beyond 10G Ethernet?
  7. Apple launches iAd Producer
  8. Take control of data you share with Digg, Twitter, Google
  9. 15 most addictive iPhone apps
  10. Microsoft yanks Office 2007 update

Get more IT peer perspective online:
LinkedIn Group | Facebook | Twitter



You are currently subscribed to networkworld_security_alert as security.world@gmail.com.
Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: