Search This Blog

Tuesday, March 27, 2012

Microsoft takes down Zeus botnets, but censors Pirate Bay links in Messenger

Microsoft moves to slow Google Apps | Mozilla sets end of Firefox for Win2K, early XP

Network World Microsoft

Forward this to a Friend >>>


Microsoft takes down Zeus botnets, but censors Pirate Bay links in Messenger
From the Microsoft good news department, the Redmond giant seized Zeus botnet C&C servers. The bad news? Microsoft's Windows Live Messenger is blocking links to The Pirate Bay torrents. Torrent Freak says Microsoft is "actively monitoring" IMs and singled out TPB links as "unsafe," a form of censorship. Read More


WHITE PAPER: BMC

5 steps from Scheduler to Enterprise Workload Automation
A patchwork of job schedulers can cause many inefficiencies, hindering IT's ability to serve the business. An enterprise approach solves these issues and adds new value. Five steps can take you from a costly mishmash to benefits like increased productivity, lower costs, and better service. Learn More!

RESOURCE COMPLIMENTS OF: Microsoft

Try Microsoft Office 365, free
Collaborate in the cloud with Office, Exchange, SharePoint, and Lync videoconferencing. Access, edit, and share documents. Starting at $8/user/month. Try it free.

Microsoft moves to slow Google Apps
Microsoft is cutting the price of its own cloud-based service, Office 365, to improve its chances of success in the enterprise market and to stave off competition from Google Apps, analysts say. Read More

Mozilla sets end of Firefox for Win2K, early XP
Next month's Firefox 12 will be the last version of Mozilla's browser to run on early editions of Windows XP and the 12-year-old Windows 2000. Read More

Microsoft leads seizure of Zeus-related cybercrime servers
Microsoft and several partners disrupted cybercrime rings that used a notorious piece of malicious software called Zeus to steal US$100 million over the last five years. Read More


WHITE PAPER: Meraki

Application Traffic Shaping in a Campus WLAN
Meraki is the only wireless LAN to include a Layer 7 application-aware traffic shaper, empowering organizations to limit apps like BitTorrent while prioritizing critical services. Learn how Rainbow School District utilized this technology to control iPads and facilitate learning activities. Learn more.

What happened to the Windows 8 critic?
Last week, a number of news outlets ran a story on a blog called Fixing Windows 8, a Tumblr site run by user interface designer and former Microsoft employee Michael Bibik. One week later, and the HTML page for fixingwindows8.com is blank except for one character, a period. If you view the source, it's also just one character, a period. Read More

Ransomware: The latest trend in malware
If the software industry showed as much innovation and initiative as the malware business, we might have some really nice software to choose from. But for now, the bad guys are one step ahead of the rest of us, with a new way to squeeze money out of your pocket. Read More

Microsoft's ads, humor boost consumer opinion of IE
Microsoft's recent campaigns touting Internet Explorer 9 have moved IE's quality perception needle for U.S. adults, according to BrandIndex, a brand quality measurement company. Read More


WHITE PAPER: Raritan

Data Center Transformations
This paper discusses ways to simplify data center transformation and introduces a new process – BOCA – Build Outs, Consolidations and Acquisitions. Learn the five stages of BOCA and see how the right remote access and IT infrastructure management tools, deployed early and continuously monitored, can dramatically improve overall efficiency. Read now!

Late May claim for Windows 8 RC jibes with expected timetable
Microsoft will launch the "release candidate" of Windows 8 in late May or early June, according to a Saturday report by a Dutch blog. Read More

Microsoft, Nokia will spend $24 million on university program to boost app development
Microsoft and Nokia will invest up to a!18 million (US$24 million) in a new mobile application development program at Finland's Aalto University during the next three years, with the goal of helping create applications for Windows Phone, the two companies said on Monday. Read More

CIA wants to spy on you through your appliances
You know how sometimes you hunt for an item that you have misplaced? A really cool aspect of the 'Internet of Things' could allow you to ask, What did I do with my remote control? The computer could tell you precisely where it is. What did I do with my book? You might get an answer like, It's at Tom's house on his coffee table. Read More

You consent to a search if a camera sees you? Facial Recognition vs 4th Amendment
When you go outside or go to other public places such as a bank or a mall, have you automatically given up your Fourth Amendment rights and consented to a search? Read More

Windows 8 update: Dell thinks it can sell Windows 8 tablets
Dell thinks it can make a buck off Windows 8 tablets, despite the fact that it pretty much abandoned its Android tablets last year. Read More



SLIDESHOWS

Review: Android-based Wi-Fi stumblers
Four easy-to-use wireless management and security tools that cost under $2.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. 20 iPad business apps every CIO should want
  2. Arista 10G switch: Fast and flexible
  3. Facebook warns employees not to ask job applicants for log-in credentials
  4. Designing 'iPad WLANs' poses new, renewed challenges
  5. If it ain't broke, don't fix it: ancient computers in use today
  6. Cisco losing router sales to HP?
  7. Figuring out the data center fabric maze
  8. Tech job seekers less likely to be asked for social-media passwords
  9. What IT managers say to get the CIO's OK
  10. 7 steps for thwarting hactivists

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_microsoft_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: