Friday, August 17, 2012

Malicious Windows malware 'Shamoon' deletes computer contents, prevents reboot

10 most powerful cloud companies | Android news and rumor roundup for the week ending Aug. 17

Network World Daily News AM

Forward this to a Friend >>>


Malicious Windows malware 'Shamoon' deletes computer contents, prevents reboot
If your Windows-based computer suddenly won't boot up, it could be the evil doing of malicious malware that deletes the contents of your computer -- farewell, documents, pictures and videos -- and then prevents reboot. Read More


WHITE PAPER: Citrix Systems

Join the scale revolution for cloud ready networks
Today's cloud evolution requires a full scale revolution. Citrix TriScale technology transforms enterprise data centers into highly scalable enterprise clouds. Download this whitepaper and learn how to scale your cloud network for more elastic performance, seamless expansion and simple consolidation. Learn More

WHITE PAPER: Teradata

Experts Share the Five Pieces of Private Cloud Success
Private clouds are emerging as a way for enterprises to take advantage of many of the benefits of the cloud model, but with less risk. This eBook discusses why private cloud models are the best choice for many organizations today. Learn more.

10 most powerful cloud companies
Virtually every vendor has a cloud story to tell. But here are 10 companies that have distinguished themselves as the leaders in cloud computing, either by being first to market, by offering the broadest and deepest set of cloud services or by taking a leadership role in the cloud revolution. Read More

Android news and rumor roundup for the week ending Aug. 17
I really thought the whole stylus idea had been consigned to the same storage closet as Zip drives and dial-up modems, but Samsung doggedly stuck with it in the Galaxy Note 10.1, an ambitious new design that attempts to compete with the iPad on its own turf. Read More

10 questions for Layer 7 Technologies CTO Scott Morrison
Layer 7 Technologies provides security and management products for API-driven integrations. Read More

The hardest part about security is...
Tripwire photographed CSO Managing Editor Bill Brenner and others with a whiteboard shaped like a talk bubble, where they answered the question: What is the hardest part of security? Here are the answers. Read More


WHITE PAPER: Aerohive

The iEverything Enterprise
Virtualization, cloud computing, and wireless technology are fundamentally changing enterprise computing, providing revolutionary gains in productivity and cost savings. Powerful enterprise applications can now be delivered to almost any device, anywhere, at any time. Learn more.

Microsoft account password: 16 characters is too long to protect Outlook.com & Skydrive?
You probably know that Microsoft's Hotmail is still touted as the "world's largest e-mail service, with 324 million members." The NYTimes reported, "But Gmail, only six years old, already has 278 million, and Microsoft was getting nervous." So it was "Goodbye Hotmail, Hello Outlook.com." Since that preview two weeks ago, Microsoft Windows Live vice president Read More

13 awesome and scary things in near Earth space
Space debris, comets, asteroids and cool clouds highlight Earth space news Read More

12 new network features in Windows 8
Read More

Windows 8 RTM available...I like it!
Windows 8 is finally here. I have been testing it out over the last few months and have been pleasantly surprised. Yes, it's different and takes some getting used to. Change is difficult. But I remember the same initial grumblings with Windows 95 and Windows XP. Gosh, I am old. The fact is, Windows 8 is really the robust foundation of Windows 7 with a cool finger-touch layer on top, nicknamed Metro.... Read More


WHITE PAPER: ADTRAN

Traditional WLAN vs. ADTRAN's Virtual Wireless LAN (vWLAN)
The substantial differences between a traditional hardware controller-based wireless LAN and ADTRAN's virtual wireless LAN (hypervisor-based) are detailed in ADTRAN's WLAN vs. vWLAN comparison chart. Learn more.

IBM to acquire solid state vendor Texas Memory
To augment its line of storage and data center systems with solid state technology, IBM is acquiring flash memory system provider Texas Memory Systems (TMS). Financial terms of the deal were not disclosed. Read More

Symantec says it has plugged hole in Norton Online Backup
Symantec today said it has plugged a hole in its Norton Online Backup service that inadvertently allowed some users to view and access data of other Norton Online backup customers. Read More

No partisan fight over cybersecurity bill, GOP senator says
A senior Republican senator insisted there is no partisan dissent over the need for a strong national cybersecurity policy but added that a Democratic-backed cyber bill that is stalled in the Senate is not the answer. Read More

Slideshow: Leftovers of Black Hat, Defcon 2012
A photographic review of the recent Black Hat and Defcon security conferences in Las Vegas. Read More



SLIDESHOWS

9 ex-Googlers on the move
Former Google employees continue to make their mark on the tech world.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Verizon offers 2 defenses of indefensible $5 fee
  2. On to Windows 9: Here are the early details
  3. Cisco answers user questions about upcoming Apple Bonjour Gateway
  4. Walmart, Target, others team to offer mobile payments network
  5. New NIST encryption guidelines may force fed agencies to replace old websites
  6. Unblinking surveillance stare: Army's 7-story flying football field-sized blimp
  7. United Airlines 'loses' 10-year-old girl, torments parents
  8. Gartner: Cloud computing's most over-hyped terms
  9. AT&T hit by DDoS attack, suffers DNS outage
  10. 25 essential business apps for Android

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: