Tuesday, 16 July 2013

Can your IP address give away your identity?

Petition calls for an end to passwords

What IT recruiters know about you -- whether you're looking or not

Network World Daily News PM
July 16, 2013
Share this email

Can your IP address give away your identity?

READ MORE
 

Issue highlights

1. Petition calls for an end to passwords

2. What IT recruiters know about you -- whether you're looking or not

3. 3D printing could trigger intellectual property wars, legal expert says

4. 3D printing has more to fear from LEGO than LEGO has to fear from 3D printing

5. New digitally signed Mac malware confuses users with right-to-left file name tricks

6. How Google and Blue Box sparked an important open source discussion

7. W3C rejects ad industry attempt to hijack do-not-track specs

8. Hijacking Office 365 and other major services via cookie re-use flaw

9. Gigabit-boosted DSL Internet standard could be ready in 2014, ITU says

10. Android mega flaw fixed but phones remain vulnerable

11. INSIDER 5 security best practices for SMBs

12. Why SaaS HR Software Is Ready to Take Off

RESOURCE COMPLIMENTS OF: BlackBerry

Get off to a great start

When you install BlackBerry® Enterprise Service 10 you qualify for 30 days of complimentary support to get you started using the software to its full potential. Also, all purchases of annual BlackBerry Enterprise Service 10 licenses come with complimentary BlackBerry® support, including 12x5 access to technical experience, online support and more. Learn more about the support services that are available once you've downloaded BlackBerry Enterprise Service 10.

Petition calls for an end to passwords

Passwords are a thing of the past -- and they need to go, according to a group of Silicon Valley-based tech companies who are part of a public advocacy campaign called Petition Against Passwords. READ MORE

What IT recruiters know about you -- whether you're looking or not

What recruiters know about you is about to get a whole lot deeper than what you put on your resume. An emerging class of search engines is taking a big data approach to recruiting by crawling the Web for every bit of data about you, assembling it into a master profile, rating your knowledge, skill levels and interests, and serving it up to recruiters who can filter it by location, skill, the school you attended and a range of other criteria. READ MORE

3D printing could trigger intellectual property wars, legal expert says

If 3D printing fulfills the potential that some have predicted for it, the technology could plague some businesses with the same intellectual property nightmares that struck the music and film industries after the introduction of Napster, according to one legal expert. READ MORE

3D printing has more to fear from LEGO than LEGO has to fear from 3D printing

Predicting the future of cutting edge technology is popular among pundits because prognosticating is easy - no license required - and there's very little chance of ever being held accountable (unless you predicted that the iPhone would flop). READ MORE

WHITE PAPER: EMC Corporation & WWT

VSPEX boost enterprise business for WWT

Prior to the VSPEX sale, the customer faced multiple challenges in delivering a fast and reliable VDI end-user experience. After working with the customer to understand the server, storage, and networking requirements Read Now

New digitally signed Mac malware confuses users with right-to-left file name tricks

A new piece of digitally signed spyware for Mac OS X uses a special Unicode character in its file name to hide its real file extension from users and trick them into installing it. READ MORE

How Google and Blue Box sparked an important open source discussion

There has been a lot of chatter on social media and in forums about the Android master key vulnerability controversy caused by its public disclosure by Jeff Forristal, CTO of Blue Box. Some very sharp developers and security analysts posted coding explanations and personal opinions. READ MORE

W3C rejects ad industry attempt to hijack do-not-track specs

The World Wide Web Consortium has rejected an attempt by the advertising industry to hijack a specification describing how websites should respond to "do not track" requests sent by Web browsers. READ MORE

Hijacking Office 365 and other major services via cookie re-use flaw

When is logging off the opposite of security? One example would be Office 365 since logging off blocks the authorized user, but not the attacker. Microsoft's Office 365 isn't the only offender as ethical hacking professor Sam Bowne pointed out after testing cookie-reuse on major websites. READ MORE

WEBCAST: HP Autonomy

Dispelling Myths about Cloud–based Archiving

Visit this Interactive Resource Center, designed to dispel any concerns you may have. It's packed with informative videos, whitepapers and case studies as well as Twitter feeds and a live Forum—everything you need to move confidently to the cloud. View Now!

Gigabit-boosted DSL Internet standard could be ready in 2014, ITU says

A broadband standard that aims to support bandwidth-intensive applications such as streaming Ultra-HDTV movies without the need to install fiber between the distribution point and people's homes met its first-stage approval, the International Telecommunication Union (ITU) said on Tuesday. READ MORE

Android mega flaw fixed but phones remain vulnerable

Handset makers are slow to push fix to users, and fragmentation is not helping in the enterprise READ MORE

INSIDER

5 security best practices for SMBs

If your small-to-midsized business is like most, you're playing a game of chicken with cyber-criminals. You probably know that your defenses probably aren't able to repel today's sophisticated, persistent attacks, yet you hope that you'll be overlooked. READ MORE

Why SaaS HR Software Is Ready to Take Off

It's estimated that 90 percent of Fortune 1000 companies plan to replace their human resources management software in the next four years. Many are replacing these legacy on-premises systems--some of which date back to the 1960s--with cloud-based HR systems. On top of hardware savings, enterprises using SaaS HR say they spend less on support. READ MORE

WHITE PAPER: Condusiv Technologies

Managing the I/O Explosion Without Extra Hardware

In this Technology Spotlight, IDC highlights the unexpected I/O explosion brought about by virtualization and presents new technologies that deliver exceptional application performance without additional hardware by eliminating unnecessary I/O traffic at the source. Read more. Read Now!

SLIDESHOWS

6 rising open source stars

Names you'll want to know in the free software/open-source world.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. AT&T offers phones on monthly installments, with annual upgrades

2. The data center fabric checklist you should know

3. Microsoft Surface RT price slashed $150

4. Bill Gates vows the return of Microsoft Bob

5. Start-ups lean hard on CPU-based security technology to protect virtual environments

6. 10 tech blockbusters (just waiting to be made)

7. Encryption no protection from government surveillance

8. SDN, NFV creeping into provider networks

9. A vendor-independent comparison of NoSQL databases

10. iPad 5 rumor rollup for the week ending July 11

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as buzzhairs@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment