Tuesday, November 20, 2007

Is Google rolling its own 10G switches? MySpace hacker tells his story; 12 spam research projects

Daily News PM Alert Network World logo
NetworkWorld.com | LANs & WANs Research Center | Update Your Profile
Is Google rolling its own 10 Gigabit Ethernet switches?

Jeff Caruso By Jeff Caruso
- Google may be building its own 10 Gigabit Ethernet switches to support its massive data-center needs, according to a recent blog post by Nyquist Capital. Read full story

Jeff Caruso is site editor at Network World. Contact him.


SPONSORED BY INFOBLOX INC.
rule

Webcast: IPAM Best Practices
Gain control of your IP address space and move beyond spreadsheets with IP Address Management (IPAM) best practices. Learn your options for IP Address Management, which will allow you to increase efficiency, lower costs, ensure compliance and improve security. Click here to view this Webcast today.

rule
RELATED NEWS:

MySpace hacker tells his story
If Samy Kamkar plays his cards right, he may be allowed to visit MySpace again in just a few months. For the time being, however, he's not even allowed to touch a computer, following a January 2007 guilty plea for creating what many consider to be the first Web 2.0 worm: the Samy worm.

12 spam research projects that might make a difference
Those who commit cybercrime know they need to stay on the cutting edge of technology to come up with new and different ways to swindle people. Luckily, the good guys are also spending time in research labs developing ways to thwart the latest tricks employed by spammers, phishers and other criminals.

Hackers jack Monster.com, infect job hunters
Monster.com took a portion of its Web site offline Monday as researchers reported that it had been compromised by an IFrame attack and was ...

Misspelled children’s Web sites lead to porn
Children’s Web sites are frequent targets of typo-squatting, a growing category of online fraud which lures unsuspecting Web surfers to malicious sites when they misspell the URL. Some typo-squatters lure children to pornographic Web sites.

Swatters tricked AT&T while making fake 911 calls
A Cleveland, Ohio, man has pleaded guilty to participating in a scheme that involved using AT&T employee passwords and identities to place false ...

Industry must completely rethink security protocols for mobile devices, security pro says
Open source mobile broadband is doomed unless carriers, software developers and device manufacturers are willing to completely ...

FSF finalizes GPL-based license for Web services
The Free Software Foundation has published a new open-source software license aimed at developers whose code is used for software-as-a- ...

2007 Gift Guide

Cell phones and smart phones
Check out our top picks for cell phones and smart phones.

BLOGS

Buzzblog: Half of stores surveyed "invite" wireless ID theft
A check of some 3,000 retail outlets that use wireless to transmit customer data shows that about half fail to use adequate encryption, with half of that bunch using no encryption at all. Enjoy your holiday shopping.


BIG THREATS IN '08
Top 5 security threats in 2008Top 5 security-menace predictions for next year.

ALL-IN-ONE FIREWALL TEST
idemandJuniper, Check Point, Cisco lead way in test of 13 UTM devices.

SPONSORED BY INFOBLOX INC.
rule

Webcast: IPAM Best Practices
Gain control of your IP address space and move beyond spreadsheets with IP Address Management (IPAM) best practices. Learn your options for IP Address Management, which will allow you to increase efficiency, lower costs, ensure compliance and improve security. Click here to view this Webcast today.

rule

Join Network World's Technology Opinion Panel
Here is your chance to help shape the future of IT. You know what products and enhancements are needed, you have the insight and foresight to be out front and provide direction to Network Word and the network industry. To join the panel, complete a brief registration survey
. The panel is strictly for technology professionals to share their vision.

Featured reader resource

90% of IT Managers are leaving their company at risk for a DNS ATTACK. Get the tools and resources you need to keep your DNS healthy and secure. Run a DNSreport on your domain today - 56 critical tests run in 8 seconds.

Visit www.dnsreport.com to learn more. (apply coupon NWW2007NLA for a 25% membership discount)

 

11/20/07

TODAY'S MOST-READ STORIES:

  1. Users give new Gmail thumbs down
  2. 2007 Cool Yule Tools Gift Guide
  3. AT&T calls teleworkers back to cubicle life
  4. Testing all-in-one firewalls
  5. A tiny math mistake and the terrorists win?
  6. Top IT Turkeys of 2007
  7. What hackers know about LAN switches
  8. Free password generators: Part 1
  9. Google building 10 Gigabit Ethernet switches
  10. Hackers poised for Black Friday assault

MOST DOWNLOADED PODCAST:
UTM: Is it ready for prime time?


Did you know that 90% of IT managers are not prepared for a DNS Attack

Don't be one of them...Check your DNS health today. Run a DNSreport and look like a hero. Make your life easier and make your company more secure. 56 critical tests against your domain in 8 seconds. Don't live without it.

Visit today to learn more!



IT Buyers guide

IT Buyer's Guides
Compare products, get advice, and check out tests and reviews from the experts at Network World. Over 70 categories. Visit now.

 


To continue receiving NetworkWorld's Daily News PM Alert newsletter, please add @nwfnews.com to your white list.

COMPLIMENTARY SUBSCRIPTIONS AVAILABLE
As a NW newsletter subscriber you are eligible to receive 50 issues of Network World Magazine, in print or electronic format, free of charge.

Sign up for your subscription today: Apply here. International subscribers,click here.

 

SUBSCRIPTION SERVICES
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Terms of Service/Privacy

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772
Copyright Network World, Inc., 2007

 

 



No comments:

Post a Comment