Search This Blog

Friday, July 31, 2009

Give your SysAdmin a hug today; Firefox cracks 1 billion

Firefox cracks 1 billion downloads; MI5 website reportedly hacked
Network World logo

Daily News PM Alert

NetworkWorld.com | Update Your Profile


Sponsored by IBM NWW
rule

Distinguish your Business Through Superior Service
Distinguish your business from competitors by delivering superior service. Download this whitepaper today and discover how top-flight service management can deliver a world-class customer experience.

rule

Spotlight Story
Have you hugged your SysAdmin today?

When your e-mail works today or the application you depend upon responds quickly, don't forget to thank your company's system administrator – after all, today is System Administrator Appreciation Day. Really. Read full story

Related News:

Firefox cracks 1 billion downloads
Less than five years after its initial release, Mozilla's Firefox Web browser has hit its one billionth download.

MI5 website reportedly hacked
MI5's official site has been hacked in a bid to steal the identities of visitors to the site, according to media reports. The hackers, who called themselves Team Elite, rigged the site to download viruses onto the machines of anyone using the British intelligence services Web site.

Twitter, Linux, Red Hat, Microsoft "honored" with Pwnie Awards
Think of the annual Pwnie Awards delivered at the Black Hat conference as a geek version of the Oscars – if they were combined with the tongue-in-cheek Razzies that celebrate the worst of Hollywood. Twitter, Linux and Red Hat were among honorees that didn't go unscathed this time around.

iPhone virus: What you need to know
The iPhone's security flaws were laid bare at the Black Hat Conference in Las Vegas yesterday, and now the smartphone-clutching public has boiled itself into a frenzy. But how serious is this supposed iPhone virus, and what can be done to protect your iPhone from infection? Here is what we know, and why you probably shouldn't worry.

Conficker talk sanitized at Black Hat to protect investigation
A talk at Black Hat had to be scaled back because it contained information about Conficker that might tip investigators' hand and send the perpetrators further underground, says F-Secure's chief research officer.

Microsoft details how to upgrade between Windows 7 SKUs
Microsoft on Friday let users who want to upgrade from one version of Windows 7 to another know how they can do so.

Adobe patches 12 Flash bugs, 3 caused by Microsoft
Adobe on Thursday patched a dozen vulnerabilities in Flash Player, including three it inherited from faulty Microsoft development code and one that hackers have been exploiting for at least a week.

Mobile phone shipments drop 11% in Q2, IDC says
The worldwide mobile phone market remained weak in the second quarter despite some encouraging signs in smartphone shipments, market researcher IDC said Thursday.

Microsoft puts positive spin on sales drop
Microsoft executives put a rosy glow on the company's prospects and performance at the company's annual financial analysts meeting, despite a recent quarterly report that fell short of revenue expectations by $1 billion.

July Giveaways
Cisco Subnet is giving away 15 copies each of books on Enterprise Web 2.0 and Building a Greener Data Center; Microsoft Subnet is giving away training from New Horizons to one lucky reader and 15 copies of Microsoft SQL Server 2008 Reporting Services Unleashed. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages. Deadline for entries July 31.

Network World on Twitter? You bet we are


Black Hat's best
Black HatHow well you remember the Black Hat conference's most notorious incidents?

Wireless burning questions
IT quizHow much longer are you going to hang onto that Ethernet cable? And other questions.

Best Practices in Lifecycle Management
Learn 11 key areas you must consider in a lifecycle management solution. Also, discover who offers the solution that provides the greatest value for the lowest cost - Altiris, KACE, LANDesk or Microsoft.
Click here to view this whitepaper.


 

July 31, 2009

TOP STORIES | MOST DUGG STORIES

  1. iPhone SMS attack to be unleashed at Black Hat
  2. Mystery solved: MS emergency patch precedes Black Hat session
  3. Clampi Trojan plunders financials for botnet
  4. CERT and ISC warn about BIND9 DNS vulnerability
  5. 5 technologies Iran is using to censor the Web
  6. Microsoft-Yahoo will change cloud computing
  7. Cloud computing confusion reigns in U.S. government
  8. Black Hat's most notorious incidents
  9. What business is Cisco in today?
  10. Cisco fixes critical WLAN flaws

Creating and Managing Value-Driven Product Portfolios
The product portfolio decisions you make today will determine whether your company is relevant tomorrow. With such a fine line between success and failure, now is the time to make product portfolio decisions based on fact—not guesswork, political agendas, intuition or the opinions of the loudest voice in the room.
Read Now



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: