Search This Blog

Friday, July 27, 2012

Shark-bitten security researcher takes another chomp out of Oracle database

Quirkiest Moments at 2012 Black Hat security conference | Windows 8 is a 'catastrophe,' says Valve founder and former Microsoft employee Gabe Newell

Network World Daily News AM

Forward this to a Friend >>>


Shark-bitten security researcher takes another chomp out of Oracle database
A researcher scored again against Oracle's database by demonstrating at the Black Hat security conference Thursday an exploit that would allow him to take control as an administrator. Read More


RESOURCE COMPLIMENTS OF: Solar Winds

Supercharge your use of Active Directory®
This terrific trio of free tools makes it easier than ever to add and remove users and computers in Microsoft® Active Directory. Save time with Active Directory management tasks with: Inactive User Account Removal Tool, Inactive Computer Account Removal Tool & User Import Tool. DOWNLOAD ALL 3 FREE TOOLS >>

WHITE PAPER: Shoretel

Sophisticated Simplicity
The key is to build simplicity and ease of use into these solutions from Day 1. This white paper will demonstrate a clear path to UC simplicity, and to overall success of UC deployments. Learn more.

Quirkiest Moments at 2012 Black Hat security conference
From half-naked booth reps to colorful robots, it wasn't all about security on the exhibit floor and around the conference Read More

Windows 8 is a 'catastrophe,' says Valve founder and former Microsoft employee Gabe Newell
The former head of Microsoft Game Studios, Ed Fries, interviewed Valve co-founder and managing director Gabe Newell at a reception at the Casual Connect game conference this week in Seattle. As expected, much of the interview revolved around developments at Valve and Newell's opinion on the future of gaming, but at one point the outspoken Newell ripped Microsoft and Windows 8, calling the upcoming... Read More

Many Cisco carrier customers planning SDNs
A majority of service providers worldwide are considering or planning purchases of software-defined networking (SDN) technologies to simplify network provisioning, and create services and virtual networks (see graphic below). That's the finding of Infonetics Research, which just released a new survey on carriers and their SDN, 40/400G and MPLS control plane strategies. Read More

The hidden iPhone: New photos from early 2006 show Apple's design tinkering
Even as iPhone 5 fever heats up, Apple-Samsung court case puts focus on original iPhone Read More


WHITE PAPER: Aerohive

The iEverything Enterprise
Virtualization, cloud computing, and wireless technology are fundamentally changing enterprise computing, providing revolutionary gains in productivity and cost savings. Powerful enterprise applications can now be delivered to almost any device, anywhere, at any time. Learn more.

Global Payments: data breach cost a whopping $84.4 million
Global Payments, which back in the spring reported a data breach in which information associated with an estimated 1.4 million payment cards was stolen, has revealed that expenses associated with investigations, fines and remediation has hit $84.4 million. Read More

Apple security guru lays out iPad, iPhone crypto architecture at Black Hat
A top Apple security guru Thursday presented an in-depth view into the security architecture for iOS, the basis of iPhones and iPad tablets, underscoring the complex certificate-based encryption framework Apple has adopted. Read More

Google adds TV as it rolls out Fiber in Kansas City
Google Fiber broadband service in Kansas City will cost US$70 per month for 1Gbps Internet access and $120 per month for that service plus TV, the company said Thursday. Read More

Windows 8 Update: Desperate for developers?
As the deadline looms for the release of Windows 8, Microsoft has launched a virtual lab where developers can tap into virtual instances of the forthcoming operating system and practice writing Metro-style applications. Read More


WHITE PAPER: ADTRAN

Traditional WLAN vs. ADTRAN's Virtual Wireless LAN (vWLAN)
The substantial differences between a traditional hardware controller-based wireless LAN and ADTRAN's virtual wireless LAN (hypervisor-based) are detailed in ADTRAN's WLAN vs. vWLAN comparison chart. Learn more.

OpenBSD founder calls Red Hat and Canonical 'traitors' to open source
Theo de Raadt, the founder of the OpenBSD project and a well-known figure in the open-source community, attacked commercial Linux vendors Red Hat and Canonical in an interview with ITWire for their plans to work with Microsoft's secure boot system. Read More

Olympics could strain enterprise networks
The Olympics happen every two years, but according to media watchers and IT professionals, the impact of the Olympics on communications traffic globally from this year's games could be more significant than any in the 116-year history of the modern games. Read More

INSIDER
How to manage IT contractors
Contract IT workers may walk, talk and code like staff, but in fact they're not company employees -- something managers should keep in mind. Insider (registration required) Read More

Twitter back up after pre-Olympics crash
After suffering an outage that lasted more than an hour and a half today, Twitter is back up and running. Read More



SLIDESHOWS

18 Notable Apple Alumni
While some with Apple ties are already well-known, others may be surprising to find on the list.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Tatu Ylonen, father of SSH, says security is 'getting worse'
  2. Black Hat panel: Which do you trust less with your data, the U.S. government or Google?
  3. Researcher wows Black Hat with NFC-based smartphone hacking demo
  4. Tool released at Black Hat contains 150 ways to bypass Web application firewalls
  5. Olympic gold: 15 free iOS and Android apps
  6. Wi-Fi and 3G hubs banned from Olympics
  7. Cisco layoffs this week part of 'Transformation Project'
  8. Earliest known photos of an Apple iPad prototype
  9. VMware snubs partner Cisco for network virtualization
  10. Microsoft needs to buy a vowel

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: