Monday, December 16, 2013

2013 computer crime blotter

First Look: Gigabit Wi-Fi adapters

Review: Apple's 15-in. MacBook Pro delivers on speed, battery life

Network World Daily News AM
December 16, 2013
Share this email

2013 computer crime blotter

Prisons around the world this year made way for techie criminals alongside the more garden variety murderers, thieves and schemers.

READ MORE
 

Issue highlights

1. First Look: Gigabit Wi-Fi adapters

2. Review: Apple's 15-in. MacBook Pro delivers on speed, battery life

3. Google dives into robotics with Boston Dynamics buy

4. US NSA debates amnesty for Edward Snowden

5. Box has been thinking outside of the cloud

6. Lulzy Christmas: Hackers buy presents for the poor with gov't officials' credit cards

7. Using SDN to Create a Packet Monitoring System

8. Bogus antivirus program uses a dozen stolen signing certificates

9. On the Internet, perhaps Twitter doesn't want you to be a dog

10. Strong opportunities and some challenges for big data security analytics in 2014

11. 20 Best iPhone/iPad Games of 2013

12. China lands rover on moon's surface, a first for the country

13. But wait -- there's more! 8 tech gadgets that multitask

RESOURCE COMPLIMENTS OF: Check Point Software Technologies

Check Point 2013 Internet Security Report

Based on research of nearly 900 companies, the Check Point 2013 Internet Security Report uncovers major security risks organizations are exposed to on a daily basis. Discover how often Bots endanger your enterprise. See how commonly-used Web applications can be high risk. Learn how easy it is to experience unintentional data loss. Read Full Report.

First Look: Gigabit Wi-Fi adapters

At some point, desktops and laptops will come with the new Gigabit Wi-Fi standard 802.11ac built in. But if you can't wait and want to speed up the wireless links on your existing devices, you can buy an 802.11ac adapter today. READ MORE

Review: Apple's 15-in. MacBook Pro delivers on speed, battery life

Apple's newest 15-in. MacBook Pro looks just like last year's model but delivers on faster performance and solid battery life, says columnist Michael deAgonia. READ MORE

Google dives into robotics with Boston Dynamics buy

Google has confirmed it's buying Boston Dynamics -- one of the most well-known robotics companies in the world -- but isn't saying much about why. READ MORE

US NSA debates amnesty for Edward Snowden

The person running a U.S. National Security Agency task force to assess the damage of the leaks by Edward Snowden told a TV network that granting him amnesty is "worth having a conversation about." READ MORE

WHITE PAPER: Dell

Tech Brief: Exchange 2013 Data Loss Prevention

Protecting your company's critical data is a critical, mandatory part of an Exchange administrator's tasks. In this white paper, learn about the data loss prevention feature in Exchange 2013 and Exchange Online, how it controls inbound and outbound data flow and how it works for businesses of any size. Read now!

Box has been thinking outside of the cloud

Many people think of Box as a cloud company. But really, it's a collaboration company, says Vikrant Karnik, senior vice president of enterprise cloud consulting services for systems integrator Capgemini, a newly minted Box partner. READ MORE

Lulzy Christmas: Hackers buy presents for the poor with gov't officials' credit cards

While there's nothing quite like the warm and fuzzy feeling of giving gifts to the less fortunate, TeamBerserk hacktivists are donating "thoughtful gifts" that are paid for with credit cards belonging to naughty government officials, politicians and corporations. READ MORE

Using SDN to Create a Packet Monitoring System

Because of the limitations of SPAN/monitor ports on switches, organizations have turned to using taps and packet monitoring switches. These solutions can be expensive which has lead companies to look for alternatives. Establishing a packet monitoring system is one of the use cases for Software-Defined Networking (SDN). This solution uses lowe READ MORE

Bogus antivirus program uses a dozen stolen signing certificates

A fake antivirus program in circulation uses at least a dozen stolen digital code-signing certificates, indicating cybercriminals are increasingly breaching the networks of software developers, Microsoft wrote on Sunday. READ MORE

WHITE PAPER: Attachmate

Why your existing solution might not be adequate

To meet the demands of today's business landscape, IT staffs must take steps to secure and integrate their information assets, while satisfying compliance mandates and optimizing corporate efficiency. This white paper presents managed file transfer (MFT) as a way to meet corporate information and data management requirements. Read More

On the Internet, perhaps Twitter doesn't want you to be a dog

READ MORE

Strong opportunities and some challenges for big data security analytics in 2014

My friends on Wall Street and Sand Hill Road will likely place a number of bets on big data security analytics in 2014. Good strategy as this market category should get loads of hype and visibility while vendor sales managers build a very healthy sales pipelines by March. Yup, there should be plenty of opportunities for big data security analytics to enter the enterprise security mainstream because... READ MORE

20 Best iPhone/iPad Games of 2013

20 Best iPhone/iPad Games of 2013 Puzzles, adventure games, dungeon crawlers, and more fun for your favorite iOS device (during off-work hours, of course). READ MORE

China lands rover on moon's surface, a first for the country

China's lunar probe, and the moon rover it carried, landed successfully Saturday night, marking a major accomplishment for the country's space efforts. READ MORE

But wait -- there's more! 8 tech gadgets that multitask

Looking for a really multifunctional gift? These mobile devices offer at least two (and sometimes more) uses -- and in very imaginative ways. READ MORE

WHITE PAPER: CDW

Software Asset Management: Getting Started

Find out what steps to take that can lead your organization down the smooth path to SAM deployment. This SAM primer can help you and your organization mitigate software non-compliance issues and optimize software license management while containing costs. Read Now

SLIDESHOWS

8 tricks to optimize Windows 8.1

Here are eight things we recommend doing to make Windows 8.1 more efficient.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. iPhone 6 rumor rollup for the week ending Dec. 12

2. 10 Linux distros to watch in 2014

3. Switch to open source successfully completed, city of Munich says

4. WiFi might rot your brain (or kill your cress)

5. ITU standardizes 1Gbps over copper, but services won't come until 2015

6. Stats don't lie: Windows 8 has failed

7. Microsoft joins group seeking to replace passwords

8. As Unix fades away from data centers, it's unclear what's next

9. 25 (mostly) tech company logos with hidden meanings

10. Cisco cuts long-term revenue forecast

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments: