Friday, July 10, 2009

Twitter suspends accounts of users with infected computers; Intel working with Google on Chrome OS

News podcast: Network World 360; Intel is working with Google on Chrome OS
Network World logo

Daily News PM Alert

NetworkWorld.com | Update Your Profile


Sponsored by Cisco
rule

Cost-Effectively Network Bolster Security
The corporate perimeter is eroding and threats are increasingly difficult to detect and mitigate. Ensure your network is protected. Learn how to build a self-defending network that incorporates innovative application and content security, monitoring technologies and policy enforcement.

rule

Spotlight Story
Twitter suspends accounts of users with infected computers

Twitter is suspending the accounts of some users whose computers have fallen victim to a well-known piece of malicious software that has targeted other sites such as Facebook and MySpace. Read full story

Related News:

News podcast: Network World 360
As the national unemployment rate continues to creep up, the number of jobs cuts in high-tech industries is also increasing across several IT segments. Also, Verizon Business is now offering to help companies analyze potential security flaws in their business applications. (5:14)

Intel is working with Google on Chrome OS
The world's largest chip maker is working with Google on the Chrome operating system and has been privy to the project for some time, a spokesman for the company said Friday.

Microsoft admits it knew of the IE, zero-day ActiveX hole for months
Microsoft this afternoon responded to accusastions that it knew about a critical IE ActiveX hole for as long as 18 months. The hole is being actively exploited by hackers. To its credit, Microsoft came clean and admitted it did indeed know since the spring of 2008.

How Sprint is helping conduct the 2010 census
When the government conducts its census next year, Sprint will be providing wireless equipment, coverage and secure connections to workers out in the field.

Korea DDOS virus mission shifts to destroying, erasing data
They say what goes around comes around and on Friday owners of bot-infested PCs in South Korea will discover that's true.

Was North Korea behind the DDOS attack?
The cyberattacks that took down prominent U.S. and South Korean Web sites in the last week have apparently ended but the search for those responsible is only just beginning. North Korea has emerged as a likely culprit, especially among politicians, but was it really behind the attacks?

News analysis: DDoS attacks highlight need to reduce government Internet access points
The network attacks that severely disrupted several federal agency Web sites this week highlights the need for the government to quickly finish implementing its ongoing consolidation of Internet access points, the former de facto CIO of the federal government and others said today.

Cisco charts new paths with Eos media platform
It's well-known that Cisco has been branching out from its core business of selling routers and switches, but in an open-plan office overlooking San Francisco's up-and-coming Mission Bay district, the networking monolith is venturing into areas that are ambitious even for one of technology's most aggressive acquisition machines.

No security in Social Security
Alessandro Acquisti, associate professor of Information Technology and Public Policy at the Heinz College at Carnegie Mellon University, explains why Social Security numbers were never intended for security and why SSNs shouldn't be used as an authentication method. (10:06)

Why HP ProCurve is dismantling Cisco's market share on a deal-by-deal basis
I spoke on the phone today with the Vice President and General Manager of HP ProCurve - Karl Soderlund, and learned why HP ProCurve is dismantling Cisco's market share on a deal-by-deal basis, for instance: If you trade-in your Cisco equipment, HP ProCurve will take 20% off its list price.

Google loves patents, applies for 30 in the past three months
Not that anyone needs any more evidence that it is Google's main mission in life is to hammer Microsoft, well, to actually to become Microsoft. But here's more anyway.

Take Care of Your Brain
It is obvious that being a good IT professional takes some brainpower. With optimal brain function you will be able to remember all sorts of technical details, troubleshoot problems faster, come up with creative approaches to tough technical challenges, and help you manage the stressful life as an IT professional. You need to remember to take care of your brain to optimize your performance.

How to Stop an Alien Attack
Keith and guest co-host Denise Dubie talk about Google's Chrome OS, offer up more good news / bad news about IT spending, and give tips on how they would repel an alien invasion. (41:30)

July Giveaways
Cisco Subnet is giving away 15 copies each of books on Enterprise Web 2.0 and Building a Greener Data Center; Microsoft Subnet is giving away training from New Horizons to one lucky reader and 15 copies of Microsoft SQL Server 2008 Reporting Services Unleashed. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages. Deadline for entries July 31.

Network World on Twitter? You bet we are


Rise and fall of Nortel
vSphereFor better or worse, Nortel as we know it is coming to an end. Here's how the telecom giant got to this point.

Summer of geeks
IT quizSpace camp! They Might Be Giants! Check out these and 9 other vacation options.

Perfecting your Disaster Recovery Strategy
How fast can you recover data in the event of a disaster? Optimize your backup and disaster recover strategy with this Executive Guide. Get expert tips and recommendations in this collection of in-depth articles from Network World and its sister publications.
Learn More


 

July 10, 2009

TOP STORIES | MOST DUGG STORIES

  1. Imagine the Googlemobile
  2. The 10 dumbest mistakes network managers make
  3. Microsoft may have known about critical IE bug for months
  4. 4chan hell raisers finding fame brings heat?
  5. Gmail, other Google apps, out of beta
  6. Windows 7 ramp-up will be sharp
  7. Yahoo invents 'chicken coop' data centre design
  8. The sudden departure of Cisco data center marketing honcho
  9. Online attack hits U.S. government Web sites
  10. Internet's biggest issue? IPv6 transition, new ARIN CEO says

Symantec Protection Suite: Top 10 Benefits
Completely protect, easily manage and automatically control your most crucial business assets. Download this whitepaper today and discover - from security and recovery to savings and compliance - the Top 10 reasons why Symantec Protection Suite offers unparalleled security.
Learn More



IT Buyers guide

 


This email was sent to networking.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: