Thursday, July 09, 2009

How to use electrical outlets and cheap lasers to steal data; How ending exclusivity would change telecom industry

IBM software 'masks' sensitive info; EMC wins Data Domain bidding war; How ending exclusivity agreements would change the telecom industry
Network World logo

Daily News PM Alert

NetworkWorld.com | Update Your Profile


Sponsored by Brocade
rule

Brocade IP Network Assessment
Organizations that plan to build next-generation networks can benefit from best practices and expertise to address critical requirements. Learn more about the Brocade IP Network Assessment to get your organization ready.

rule

Spotlight Story
How to use electrical outlets and cheap lasers to steal data

If attackers intent on data theft can tap into an electrical socket near a computer or if they can draw a bead on the machine with a laser, they can steal whatever is being typed into it. Read full story

Related News:

IBM software 'masks' sensitive info; EMC wins Data Domain bidding war
IBM researchers have developed software that uses optical character recognition and screen scraping to identify and cover up confidential data. Also, storage vendor Data Domain has agreed to be acquired by EMC for $33.50 per share, ending a bidding war that had pitted EMC against NetApp. (x:xx)

How ending exclusivity agreements would change the telecom industry
Can AT&T and other carriers adapt their strategies when they don't have flagship devices to market?

Google Native Client provides hints on Chrome OS gambit
Google Wednesday didn't reveal many specifics about its Chrome operating system project, but a technology the company introduced late last year could provide a preview of what is to come.

Dangerous security flaw likely just a hoax
A claim of a software vulnerability in a program used to connect securely to servers across the Internet is likely a hoax, according to an analyst with the SANS Internet Storm Center.

New Spam Trick: Shortened URLs
Shortened URLs, a service on many sites that turns lengthy Web addresses into shorter URLs, is rapidly becoming a popular way for spammers to reach unsuspecting readers. New analysis from Symantec's MessageLabs finds shortened URLs now account for 2 percent of all spam in inboxes.

Verizon helping companies assess application vulnerabilities
Verizon Business is now offering to help businesses analyze potential security flaws in their business applications.

Microsoft licenses, launches giant library of free IT governance tools
Microsoft has licensed two of the industry's leading methods for IT governance, integrated them with its own IT governance framework and made the whole library of materials available for free.

Cisco lost market share in network security appliances and software in 1Q09
Jeff Wilson - network security analyst at Infonetics Research, provides further details on why Cisco has lost market share in network security:

Sony unveils its first netbook PC
The Vaio W will push Sony into the only part of the PC market showing growth at present.

US offering $45 million for huge wind energy test bed
On a day when one of the largest wind farm plans bit the dust, the US Department of Energy is offering up a five-year, $45 million contract to design and build a large dynamometer facility for testing 5 to 15 MW rated wind turbines and equipment.

July Giveaways
Cisco Subnet is giving away 15 copies each of books on Enterprise Web 2.0 and Building a Greener Data Center; Microsoft Subnet is giving away training from New Horizons to one lucky reader and 15 copies of Microsoft SQL Server 2008 Reporting Services Unleashed. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages. Deadline for entries July 31.

Network World on Twitter? You bet we are


Rise and fall of Nortel
vSphereFor better or worse, Nortel as we know it is coming to an end. Here's how the telecom giant got to this point.

Summer of geeks
IT quizSpace camp! They Might Be Giants! Check out these and 9 other vacation options.

Dell's SMART Approach to Workload Automation
Read a compelling case study by EMA, Inc. to learn how Dell uses BMC CONTROL-M to cut cost and increase productivity with workload automation.
Learn More Today


 

July 09, 2009

TOP STORIES | MOST DUGG STORIES

  1. Imagine the Googlemobile
  2. The 10 dumbest mistakes network managers make
  3. Microsoft may have known about critical IE bug for months
  4. 4chan hell raisers finding fame brings heat?
  5. Gmail, other Google apps, out of beta
  6. Windows 7 ramp-up will be sharp
  7. Yahoo invents 'chicken coop' data centre design
  8. The sudden departure of Cisco data center marketing honcho
  9. Online attack hits U.S. government Web sites
  10. Internet's biggest issue? IPv6 transition, new ARIN CEO says

Next-Generation Data Centers
IT transformation begins at the data center, as enterprises embrace technologies such as virtualization and cloud computing to build adaptable, flexible and highly efficient infrastructures capable of handling today's business demands.
Read this Guide.



IT Buyers guide

 


This email was sent to networking.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: