Monday, August 03, 2009

Who's running the (app) store?; Some SMS networks vulnerable to attack

Some SMS networks vulnerable to attack; Sprint gains 777,000 prepaid subscribers, but overall subscriptions still falling
Network World logo

Wireless Alert

NetworkWorld.com | Update Your Profile


Sponsored by Riverbed
rule

Accelerate TCP Applications
Combining deduplication with WAN optimization provides 150 to 1 backup data replication efficiency. Learn how you can build the system you need and add components as you grow to: centralize data, cut WAN traffic up to 90%, improve RTO and RPO and more.

rule

Spotlight Story
Who's running the (app) store?

It was Sun Microsystems that first famously (and sagely) proclaimed, "The network is the computer." And for years, Cisco's slogan, "The network is the platform," has persevered. Now, the notion that the utility of a computer is proportional to the capabilities of the network(s) attached to it has spilled over into the mobile environment. Read full story

Related News:

Some SMS networks vulnerable to attack
Flaws in the way some mobile-phone networks handle SMS (short message service) signaling data could leave them open to a whole new range of attacks.

Sprint gains 777,000 prepaid subscribers, but overall subscriptions still falling
Sprint added 777,000 prepaid wireless subscribers to its ranks in 2Q, but suffered a net loss of 257,000 wireless subscribers for the quarter.

July Giveaways
Cisco Subnet is giving away 15 copies each of books on Enterprise Web 2.0 and Building a Greener Data Center; Microsoft Subnet is giving away training from New Horizons to one lucky reader and 15 copies of Microsoft SQL Server 2008 Reporting Services Unleashed. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages. Deadline for entries July 31.

Network World on Twitter? You bet we are


Black Hat's best
Black HatHow well you remember the Black Hat conference's most notorious incidents?

Wireless burning questions
IT quizHow much longer are you going to hang onto that Ethernet cable? And other questions.

Identity Management: complexity made simple
Sun's pragmatic approach to identity management combats complexity with everyday solutions, helping you streamline and simplify the identity infrastructure to reduce costs, tighten security, and mitigate risk. View the Sun Identity Management Solution Center today.
Identity Management: complexity made simple


 

August 03, 2009

TOP STORIES | MOST DUGG STORIES

  1. iPhone SMS attack to be unleashed at Black Hat
  2. Mystery solved: MS emergency patch precedes Black Hat session
  3. Clampi Trojan plunders financials for botnet
  4. CERT and ISC warn about BIND9 DNS vulnerability
  5. 5 technologies Iran is using to censor the Web
  6. Microsoft-Yahoo will change cloud computing
  7. Cloud computing confusion reigns in U.S. government
  8. Black Hat's most notorious incidents
  9. What business is Cisco in today?
  10. Cisco fixes critical WLAN flaws

Effectively Supporting Consumer-Owned Smartphones
Resolve Smartphone downtime incidents quickly by sharpening your approach to mobile device management. In this whitepaper Osterman Research clearly explains which Smartphones are being used, how IT shops are managing these devices and how the heterogeneous nature of the market is causing more complexity for IT professionals.
Learn More



IT Buyers guide

 


This email was sent to networking.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: