Monday, August 11, 2014

The 10 most terrifying security nightmares revealed at the Black Hat and Def Con hacker conferences

Microsoft's inconsistent Windows Phone 8.1 strategy stumbles forward | How hackers used Google in stealing corporate data

Network World Voices of Networking

Forward this to a Friend >>>

The 10 most terrifying security nightmares revealed at the Black Hat and Def Con hacker conferences
Hacked planes. Unstoppable, utterly malicious flash drives. Hotel automation gone crazy. These are the 10 most terrifying security stories out of the premier hacker and security conferences in Las Vegas. Read More

WHITE PAPER: Kemp Technologies

The Internet of Things White Paper: Is Your Network Ready?
From healthcare to automotive and manufacturing to consumer electronics, the Internet of Things is a quantum revolution in how we think about data connectivity. Learn More


MyIT- Consumer Cool for Business Apps
Rich Ptak discusses how BMC's MyIT combines the ease and familiarity of accessing today's consumer apps with the stability, security and strengths of the enterprise IT infrastructure. Learn More

Microsoft's inconsistent Windows Phone 8.1 strategy stumbles forward
New phones for some, no updates for others. No wonder Windows Phone is at 3% market share. Read More

How hackers used Google in stealing corporate data
A group of innovative hackers used free services from Google and an Internet infrastructure company to disguise data stolen from corporate and government computers, a security firm reported. Read More

Def Con talk gives low-tech tips for detecting high-tech surveillance
An associate professor of digital forensics presented, "Am I being spied on: Low-tech ways of detecting high-tech surveillance," at Def Con 22. Read More

10 tech pros who push their downtime to the limits
As if IT leadership isn't challenging enough, some tech pros choose not to kick back when the day is done. Here's how flying a stunt plane or birthing a llama can make you a better leader. Read More

WHITE PAPER: Citrix Systems

Tolly Test Report - How NetScaler outperforms F5
Measurable performance is a key factor when selecting an Application Delivery Controller(ADC) solution for modern data centers. In this report, Tolly evaluates the performance of several Citrix NetScaler ADC models vs. that of comparable products. Learn how NetScaler fared and provided up to 480% the performance of F5. Learn more

Windows 8's no-name update plan nails OS's coffin shut
Policy of smaller, faster updates also heralds broad changes to Windows in the future, say analysts; puts enterprises even further behind 8-ball Read More

Wikimedia: Right to be forgotten results in 'Internet riddled with memory holes'
Google removes over 50 links to Wikipedia from search results in Europe Read More

What it means that smartphones are the fastest-growing IT sector
All hail the new King of IT: IDC's latest Black Book predicts worldwide IT spending growth will come mostly from smartphones. Read More

Rackspace clarifies its IaaS message
Rackspace still offers IaaS, but only with a support package. Read More


Increase Your Data Center IQ
Discover how to improve network efficiency, lower IT costs and more proactively manage your physical, virtual and cloud environments. Join BMC Software and partners, Entuity and Sentry Software, to learn how to build data center success with a comprehensive performance monitoring solution. Learn More

Glaser returns to head RealNetworks, vows to be 'video cloud' leader
The ex-CEO who returned as interim CEO has been made permanent. This sounds familiar. Can history repeat? Read More

T-Mobile could soon be bigger than Sprint
Subscriber gains could make T-Mobile the third-biggest U.S. carrier later this year, a new report says Read More

Nadella leaves no doubt about who is in charge in first six months as CEO
He's had his share of hits and misses but he's made his presence felt from the start Read More

Cisco's new UCS fabric interconnect: no ACI?
The quietly introduced 6324 "mini UCS" has no connection to newest data center fabric Read More


Black Hat 2014: How to crack just about everything

From cell phones and cars to IPv6 security researchers have turned their skills against a world of technology.


As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn


1. Netscout sues Gartner over Magic Quadrant rating

2. Why TCP/IP is on the way out

3. Amazon Fire Phone: Nice but nothing to get fired up about

4. Rackspace bows out commodity IaaS market in favor of 'managed cloud'

5. Cisco's new UCS fabric interconnect: no ACI?

6. Smartphone kill-switch bill passes California assembly

7. Emerging networking technology used by Apple, Cisco will frustrate firewalls

8. IBM/DARPA turn out brain-like 5-billion transistor superchip

9. 10 ways to get noticed at Black Hat

10. Top 20 colleges for computer science majors, based on earning potential

Do You Tweet?
Follow everything from on Twitter @NetworkWorld.

You are currently subscribed to networkworld_voices_of_networking as

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact:

To contact Network World, please send an e-mail to

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to **

No comments: