Thursday, January 14, 2010

Hackers used rigged PDFs to hit Google; Debate rages over physical and IT security; Best portable hard drives

Debate rages over converging physical and IT security | Best Portable Hard Drives

Network World Daily News AM Alert

Forward this to a Friend >>>


Hackers used rigged PDFs to hit Google -- and Adobe, says researcher
Adobe today confirmed that the cyberattack that hit its corporate network earlier this month was connected to the large-scale attacks Google cited yesterday as one reason it might abandon China. Read More


SPONSOR: HP

Masters of Enterprise Servers
This resource center is updated daily with the latest server news and contains a weekly blog from our server expert and contributing editor, Deni Connor. It also contains a collection of valuable resources including IDC White Papers, HP Guides and data sheets, and more! Check it out now to expand your server knowledge by reading the latest industry news and downloading relevant resources. Learn more now.

SPONSOR: Dell

Case Study: Six Billion Slurpees and Counting
Managing remote users was a help desk nightmare for convenience storage giant, 7-Eleven. Read how 2800 new laptops were deployed in 30 days reducing help desk calls by 67%, decreasing management costs by 81% and increasing productivity by 30%. You'll even get the latest tally on Slurpees sold! Learn More

Debate rages over converging physical and IT security
IT departments are no strangers to turf wars, but the one shaping up between those overseeing computer networks and those in charge of physical security could really get ugly. Read More

Best Portable Hard Drives
These pocket-size drives are great for backup or for storing your multimedia file collection. Read More

Tell us about your favorite IT gear
Do you have a favorite enterprise IT product you can't live without? Tell us about it and we'll share your raves with our readers. Read More

Hacking risks persist even if companies withdraw from China
Google and other enterprises still face a bleak computer security landscape that makes their companies vulnerable to hackers, whether they do business in China or not, analysts say. Read More

China won't yield to Google on censorship, analysts say
Google risks having its online services blocked in China as it defies local authorities by ending censorship of results on its Chinese search engine, analysts said. Read More


SPONSOR: Zscaler

How Hackers are Targeting Enterprise Users via Web 2.0 Browser Exploits
Securing enterprise servers with firewalls and intrusion detection is critical, but the most common threats are executed on thousands of mobile end users through the Web. Lean how to protect your clients with more than desktop anti-virus/anti-spyware and HIPS. Learn more!

Cyber attacks: Cisco appears to embrace China while Google fights China
This week Cisco appeared to embrace China, while Google chose to fight China. Read More

HP and Microsoft Aim to Deflect Google
Looks like the next generation data center will have nothing to do with who has the best technology; rather, it will be based on who can do the best job at partnering at the highest level and executing on that partnership to ultimately deliver a solution to the customer. The solution is also shaping up to look nothing like what it looks like today. Read More

Facebook, McAfee team on Facebook security effort
Facebook and McAfee have formed a partnership aimed at improving security for Facebook's 350 million users. Read More

20% of businesses will get rid of all IT assets as they move to cloud, Gartner predicts
Cloud computing will become so pervasive that by 2012, 20% of businesses will own no IT assets at all, Gartner predicts. Read More

AT&T to FCC: Time to end yesterday's network
The FCC's request for comments about transitioning from "circuit-switched network to all-IP network" could produce some interesting and maybe useful results, according to columnist Scott Bradner. Read More

Indian outsourcers see a turnaround ahead
The market for Indian outsourcers is on the mend, but these companies will have to build expertise in new technology areas, and set up operations in multiple locations to take advantage of market conditions, according to analysts. Read More



New look

We've revamped our newsletters so that they're cleaner, easier to read and lighter on the HTML formatting. What do you think? Let us know - and thanks for reading!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

New giveaways! Win a year's worth of 24/7 video training from ClipTraining. Win books on WS2008 R2, Cisco WAAS and the CCIE. Deadline Jan. 31. Plus: On Cisco Subnet: Cisco buys Rohati Systems; On Microsoft Subnet: Charting out prices for Office 2010; On Google Subnet: Google plans free white spaces database.

Ethernet everywhere Decade in tech
Here is a quiz on the most important or quirkiest tech stories to hit the front pages over the first 10 years of the 2000s.




Windows 7Cool Yule Tools
Best picks from this year and a look back at 10 years of tech toys and gadgety gifts.




MOST-READ STORIES

  1. Google may pull out of China after cyberattacks
  2. Facebook unleashes lawyers on Web 2.0 Suicide Machine
  3. Forrester: Tech downturn 'unofficially over'
  4. IBM still leads in patents, Microsoft maintains No. 3 spot
  5. World's biggest cruise ship sails through wireless challenges
  6. Quiz: What were the first products from today's tech companies?
  7. Banking malware found in Google Android market
  8. MagicJack unveils femtocell at CES
  9. Cisco ASA takes on botnet
  10. Google attack part of widespread spying effort

Network World on Twitter? You bet we are

You are currently subscribed to networkworld_daily_news_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Update your profile | Terms of Service/Privacy

Copyright Network World, Inc., 2010

Network World, Inc.,, 492 Old Connecticut Path, Framingham, MA 01701


No comments: