Search This Blog

Friday, August 27, 2010

Low-threat worm caused 'most significant breach' of U.S. military net

Rootkit with Blue Screen history now targets 64-bit Windows | Employees cranky about Web browsing restrictions

Network World Daily News AM

Forward this to a Friend >>>


Low-threat worm caused 'most significant breach' of U.S. military net
The most significant breach of U.S. military computers ever was carried out in 2008 by W32.SillyFDC, a low-level-threat worm that got into the network via a thumb drive plugged into a military laptop. Read More


WHITE PAPER: Shoretel

TCO Whitepaper
Comparing competing solutions on equal footing can be difficult. We also know that a system with the lowest purchase price may not have the lowest total cost of ownership (TCO) over the lifespan of the IP unified communications system. To help with your comparison, learn the 12 cost components that must be incorporated in any TCO analysis. Read more!

WHITE PAPER: Brocade

The State of Data Center and Network Infrastructure
Instead of a preparation method of rip and replace, examine how organizations can follow a more cost-effective strategy of evolving their data centers. Go inside the phased network architecture upgrade, which enables new levels of application flexibility and business agility. Read now!

Rootkit with Blue Screen history now targets 64-bit Windows
Updates to a new version of the malware dubbed Alureon, TDL and Tidserv are designed to infect 64-bit Windows PCs for the first time. Read More

Employees cranky about Web browsing restrictions
Workers who can't browse certain Web sites or access particular networks at the office are voicing their complaints, says staffing firm Robert Half Technology. Read More

Sources to protect you from the zero-day Windows DLL exploit
Even though Microsoft is so far refusing to patch the critical Windows DLL vulnerability that has become the source of an ever growing number of new exploits, you can protect your systems now. But it won't be easy. Read More


WHITE PAPER: HP

Simple Ways to Get the Most from Your Blade Environment
This technical brief describes the architecture and the implementation of major technologies in the HP Integrity Servers c-Class server blades. The HP Integrity server blades architecture opens a chapter in server scalability by using a common base 2S (two socket) base blade to build four and eight socket systems. Read Now

AT&T sees businesses wading slowly into IPv6
Even though we're due to run out of IPv4 addresses in the next year, AT&T doesn't expect enterprises to be fully IPv6-ready when D-Day arrives. Read More

Rumored SAP-Red Hat merger seen as a long shot
Rumors swirled once again this week regarding a possible takeover of Red Hat, this time by SAP, but a number of industry observers said Thursday that the prospect is unlikely at best. Read More

Google improves real-time search engine
Google's real-time search engine, which indexes and serves up status updates, messages and other public content from sites like Twitter and Facebook, now has its own Web address and contains new filtering capabilities. Read More


WHITE PAPER: Sprint

"Business-class" Service for the Global Customer
Can global customers that are not part of the world's largest global companies get the "business-class" service they deserve? Find out in this white paper. Read More

How to get 150,000 Twitter followers
Despite sharing every banal aspect of my life in mind-numbing detail, I remain some way short of 150,000 Twitter followers. Even the mighty PC Advisor's informative feed remains a little shy. But UK design magazine Creative Review's Twitter feed has hit the magic number, off the back of a print circulation of 20,000 and a website that delivers around 250,000 page impressions a month (compare that with PC Advisor's 4 million or so views, and you'll see just how impressive a stat that is). Read More

AMD to test upcoming netbook processors in servers
Advanced Micro Devices is considering the implementation of its upcoming low-power netbook chips based on the new Bobcat architecture in low-end servers, the company said this week. Read More

Solve Internet Explorer 6 Problems--By Ditching IE6
Reader John is having a problem with Internet Explorer 6 (which he's running on Windows XP Pro SP3): When he shift-clicks a link to open a page in a new browser window, that window shows up blank. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

SLIDESHOWS

Cloud storage lives up to the hype
We tested five cloud-based storage services under real-world conditions. We set up accounts, connected with the vendor storage network, uploaded and downloaded files, measured performance and analyzed cost structures. Our conclusions are that cloud-based storage can save you money. And cloud-based storage can be fast. However, there are still security concerns that you need to be aware of.

Wireless networks and mobility quiz
iPhones and other handhelds bought for home use are infiltrating corporate networks, but there's a host of other wireless technologies that comprise a wave of mobile computing that is creating sweeping changes in business infrastructure. How well versed are you in the technical and not-so- technical details?

MOST-READ STORIES

  1. Zero-day Windows bug problem worse than first thought
  2. Linux community finally fixes 6-year-old critical bug
  3. Intel-McAfee deal baffles security analysts
  4. Android 2.2: How to install Flash on Froyo
  5. Intel buys McAfee: My two cents
  6. Microsoft won't showcase Hyper-V at VMworld
  7. Cameron Diaz could wreck your PC, McAfee warns
  8. Decorate with Linux
  9. Intel to buy McAfee in $7.68 billion blockbuster
  10. Does Intel buying McAfee have any impact on open source

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: