Friday, May 10, 2013

Security tools can't keep hackers at bay

Stealthy Web server malware spreads further | Hottest products from Interop 2013

Network World Compliance

Forward this to a Friend >>>


INSIDER
Security tools can't keep hackers at bay
Credit card data of customers of Schnucks supermarkets was exposed for months in a breach that was not closed until weeks after a card processing company issued an alert about fraudulent activity. Insider (registration required) Read More


WHITE PAPER: HP, Microsoft & Intel

Big Data Requires a Remodeling of the Data Warehouse
Take a few moments to learn about a data warehouse appliance that is a massively parallel server optimized to run Microsoft's SQL Server that delivers enterprise scalability, ease of maintenance, and a single version of the truth, all for a low cost. Read Now!

WHITE PAPER: IBM Corporation

VCC is Leading construction company penetrates new markets
VCC leverages smartphone-enabled iExtensions CRM and a range of IBM products as a platform for dramatic business transformation Learn More

Stealthy Web server malware spreads further
A stealthy malicious software program is taking hold in some of the most popular Web servers, and researchers still don't know why. Read More

Hottest products from Interop 2013
Interop 2013, one of the biggest networking shows each year, is here and the product announcements are plentiful Read More

Passwords: You're doing it wrong. Here's how to make them uncrackable.
For years now I've harangued relatives about their shoddy password practices. Either they use easily hacked passwords or forget the passwords they've created--sometimes both. Read More


WHITE PAPER: Raritan Inc

Data Center Transformations
This paper discusses ways to simplify data center transformation and introduces a new process – BOCA – Build Outs, Consolidations and Acquisitions. Learn the five stages of BOCA and see how the right remote access and IT infrastructure management tools, deployed early and continuously monitored, can dramatically improve overall efficiency. Read now!

Old Java exploit kit taught new tricks
G01pack mounts a multi-stage attack after invading computers running unpatched versions of Oracle's Java 6 Read More

Pentagon nod shows Android can be as secure as BlackBerry
Samsung's Knox system for Android devices gets approval for use in government and military like the BlackBerry, once the gold standard Read More

Proposed U.S. law aims to counter cybertheft with import bans
A bill proposed in the U.S. Senate aims to block imports of products containing U.S. technology stolen online, a move that appears primarily directed at China. Read More


WHITE PAPER: Riverbed Technology

Case Study: Boston College
Read this case study to learn how Boston College has reduced complexity of the backup process for over 1,700 seats by centralizing management. Read now

Use of 'honeywords' can expose password crackers
With more and more consumers having their passwords compromised on a daily basis, a pair of researchers are floating an idea that they contend will help foil digital credential crackers. Read More

Interop network squares off against controlled 70G bit/sec DDoS attack
The network at one of the biggest annual networking shows is being subject to a series of distributed denial of service attacks (DDoS) creating the equivalent of 90 million sessions attempting to use the network at the same time, all as part of a controlled test of the Interop network. Read More

McAfee to acquire firewall maker Stonesoft
McAfee plans to acquire Stonesoft, a Helsinki-based maker of firewalls, for US$389 million in cash, the companies said Monday. Read More

When Tech Titans Fall from Grace
Here's our list of 14 once-elite tech companies that fell off their pedestals due to unforeseen circumstances, arrogance, ineptitude, or all of the above. Read More



SLIDESHOWS

Hottest products from Interop 2013

Interop 2013, one of the biggest networking shows each year, is here and the product announcements are plentiful.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. iPad 5 rumor rollup for the week ending May 8

2. EMC lopping off another 1,004 employees

3. Commodity hardware will be hallmark of SDN networks

10. Interop network squares off against controlled 70Gbps DDoS attack

9. Intel: Keeping up with Moore's Law becoming a challenge

6. Last place you want to see a Windows error message: Las Vegas hotel elevator, 20th floor

5. Hottest products from Interop 2013

4. Time-saving PC tips and tricks

7. Passwords: You're doing it wrong. Here's how to make them uncrackable

8. Looks like Samsung's S-Voice doesn't like the iPhone


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment