Search This Blog

Wednesday, May 30, 2012

Iran's discovery of Flame malware turning into political hot potato

  Cisco software defined-networking products on tap in June | Gearhead: Hardware We Want to Get Our Hands On
 
  Network World Daily News PM

Forward this to a Friend >>>


Iran's discovery of Flame malware turning into political hot potato
With Iran's computer-emergency response center now decrying Windows-based cyber-espionage software known as Flame (or alternately Flamer or Skywiper) it says it discovered infecting its oil-ministry computers, the uproar is reaching into the United Nations, which is investigating the malware. Read More


RESOURCE COMPLIMENTS OF: Research In Motion

Introducing BlackBerry® Mobile Fusion
Easily manage and secure mobile device deployments with BlackBerry® Mobile Fusion. From a single interface, manage BlackBerry® smartphones, BlackBerry® PlayBook™ tablets and devices that use the iOS® and Android™ operating systems. Put an end to mobile chaos. Learn more at blackberry.com/mobilefusion

WHITE PAPER: Silver Peak Systems, Inc.

Top 8 WAN Optimization Vendors Rated and Ranked
Limited bandwidth, long distances and poor network quality prohibit cost reductions for today's critical IT initiatives. Your IT organization needs WAN optimization that can be deployed anywhere, on any platform, and for the lowest cost. See how the new Gartner Magic Quadrant for WAN Optimization Controllers can help. Read now.

Cisco software defined-networking products on tap in June
Cisco will make software defined-networking (SDN) product announcements at its CiscoLive conference in June that will show initial steps in how it plans to roll out the fledgling technology. Read More

Gearhead: Hardware We Want to Get Our Hands On
Read More

IT staff, engineers among top 10 toughest jobs to fill in US
Forty-nine percent of US companies are having a hard time filling what workforce management firm ManpowerGroup calls mission-critical positions within their organizations with IT staff, engineers and "skilled trades" among the toughest spots to fill. Read More


WHITE PAPER: FireEye

Strategies for advanced threat security in 2012
Download this new FireEye research brief and learn how traditional security defenses can leave you vulnerable and necessary steps to gain visibility into all stages of the attack vector. Read now.

HP: New data center technology goes easy on the grid
A combination of solar power and carefully automated management should let data centers have a net grid impact of zero, HP said Wednesday in announcing its new data center infrastructure. Read More

Do NOT dismiss TV host's frivolous lawsuit, EFF urges court
Now here's something you don't see every day: The Electronic Frontier Foundation is urging a California court not to dismiss a frivolous lawsuit. Why? So that the "TV star" who filed the suit will get a taste of California's tough anti-SLAPP justice instead of scurrying off to the plaintiff-friendlier Illinois legal system. From the EFF press release: Read More

Intel adds sleep-mode Wi-Fi connectivity feature to ultrabooks
Devicescape today announced a deal with Intel that will give owners of certain Intel-powered machines "enhanced connectivity" to Devicescape's Wi-Fi network of more than 7 million public hotspots. Read More


WEBCAST: Dell

Mobility KnowledgeVault
How "mobile ready" is your infrastructure? This Mobility Knowledge Vault provides a wide variety of expert advice on how to strike a balance between end user ease-of-use and security. View now

BYOD Security Gotchas
I've spent a fair amount of time lately on BYOD, mobile devices, and related issues around information/cyber security. Yes, we are still firmly in the hype cycle but some mobile device security patterns are starting to emerge. Read More

Mobile device management: Getting started
The rapid-fire spread of mobile devices being used by enterprise employees can be a huge boon for businesses in productivity and customer service gains, but those advantages don't come without a price. Read More

UNCC Breach Highlights the Need to Think Differently about Cybersecurity
The University of North Carolina-Charlotte (UNCC) recently disclosed that they have discovered over 350,000 student, staff and faculty records – including Social Security numbers – that have been exposed to public access in multiple systems, in some cases for several years. RELATED: What a Psychopath Can Teach Us About Information Security Read More

1 in 5 U.S. Windows PCs lack antivirus defenses
Nearly a fifth of Windows PCs in the U.S. lack any active security protection, an antivirus vendor said today, citing numbers from a year-long project. Read More

5 Ways to Send a Custom Software Project Off the Rails
Unless you want to build a software system that quickly becomes a fossil (or a monster), you should avoid doing these five things that usually seem like a good idea at the time. Read More

 
 
 

SLIDESHOWS

10 terrific LTE smartphones for $150 or less
LTE on the cheap: Offerings from Apple, Samsung, Nokia and more make cut.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. AT&T demands we change our networks
  2. 10 reasons your Wi-Fi speed stinks (and what you can do about it)
  3. Scary times ahead for smartphone vendors, says analyst
  4. Consumer Reports: Free anti-malware software for Windows, Mac is effective
  5. Mind your mobile manners: Top 10 on-the-go blunders
  6. iPhone 5 rumor rollup for the week ending May 25
  7. Google warns users infected with DNSChanger as Web outage nears
  8. NSA security expert worries about mobility, cloud
  9. Did Cisco make the right call with Cius?
  10. Rare footage from iPhone production line revealed
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: