Friday, September 19, 2014

China says US hacking accusations are 'totally groundless'

The 2014 Ig Nobel Prize winners | Review: New Gigabit Wi-Fi options for enterprise, SMB, SOHO

Network World Compliance

China says US hacking accusations are 'totally groundless'
The country says it has no knowledge of attacks against US transportation contractors Read More


WHITE PAPER: Samsung

Scaling the Mobile Enterprise
Not all employers are ready to jump into the mobility space. There is a lot more to consider than just productivity, revenue growth, and operational efficiency – they have to consider security, device fragmentation, application and content complexity as well as cost to implement enterprise mobility. Learn More

WHITE PAPER: BMC Software

Five Levers to Lower Mainframe MLC Costs
This paper discusses five levers you can use to lower your mainframe MLC costs by up to 20 percent or more. Explore best practices and real-world examples of dramatic savings through a mainframe MLC optimization strategy based on higher visibility, predictability, and automation. Learn More

The 2014 Ig Nobel Prize winners
The bizarre, insane and otherwise way-out winners of science's Razzies. Read More

INSIDER
Review: New Gigabit Wi-Fi options for enterprise, SMB, SOHO
Last year, we reviewed two 802.11ac access points and six 802.11ac adapters. Earlier this year, we reviewed five mobile 802.11ac devices. Now we take a look at five more 802.11ac devices that have hit the market: four access points and one wireless bridge.To read this article in full or to leave a comment, please click here(Insider Story) Read More

New US Senate bill aims to limit access to emails stored abroad
The legislation follows Microsoft's refusal to turn in emails in Ireland to U.S. law enforcement Read More


WHITE PAPER: Guidance Software

How 3 Cyber Threats Transform the Role of Incident Response
While we still use many of the same old names- trojans etc.- today's malware enables potent multistage attacks called advanced persistent threats. This paper describes how malware enables these advanced persistent threats and how enterprise information security and incident response (IR) teams can employ cyberforensics tools to minimize the damage Learn more

BitTorrent opens Bleep peer-to-peer encrypted chat program to public testing
The application is available for Windows, Mac and Android and a supports voice calls and instant messaging Read More

Quick look: NASA's human space flight return
NASA teams with Boeing, Space X to bring human spaceflight back to reality Read More

Apple updates privacy policy, sets up site to guide users
Apple said it believes a great customer experience shouldn't come at the expense of user privacy Read More


: Guidance Software

SANS 2014 Survey of Endpoint Intelligence
SANS conducted its first Endpoint Security Survey by asking IT professionals how their organizations are monitoring, assessing, protecting and investigating their endpoints, as well as remediating breaches upon detection. Read the results in this report. SANS 2014 Survey of Endpoint Intelligence

Open-source project promises easy-to-use encryption for email, instant messaging and more
Pretty Easy Privacy system aims to make encryption of written online communication accessible to masses Read More

Data protection authorities find privacy lapses in majority of mobile apps
One in three applications request excessive permissions, and privacy information is inadequate in 85 percent of them, a study found Read More

Google to turn on encryption by default in next Android version
Law enforcement would have to approach a device's owner since the encryption keys are stored on the device Read More

Malicious advertisements distributed by DoubleClick, Zedo networks
The advertisements redirect victims to the Nuclear exploit kit, which tries to install the Zemot malware Read More

Going rogue
A quick drive around Washington DC found 15 rogue cell phone towers. Read More


SLIDESHOWS

Sneak Peek: New features coming to Internet Explorer

Microsoft's new Developer Channel offers glimpse into upcoming features of IE.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Going rogue

2. Internet of Overwhelming Things

3. Is SWAT raid on wrong house, based on open Wi-Fi IP address, unconstitutional?

4. Google lets Apps users bypass admins and install third-party Marketplace tools

5. What is Metacloud and why did Cisco buy it?

6. OS 8 is here – and it's all over your network

7. Deep-dive review: iOS 8 packs some snappy new feature

8. The kill switch is here: iOS 8 enables it by default

9. How Google is helping me live a cellphone-free life

10. Browser comparison: How the five leaders stack up in speed, ease of use and more


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: