Wednesday, December 24, 2014

Exploits for dangerous network time protocol vulnerabilities can compromise systems

  Vulnerability in embedded Web server exposes millions of routers to hacking | Hotel group asks FCC for permission to block some outside Wi-Fi

 
  Computerworld Networking

Exploits for dangerous network time protocol vulnerabilities can compromise systems
Systems administrators are urged to install critical patches that address remote code execution flaws in NTP. Read More
 


WEBCAST: IBM Corporation
 
Do you know how Forward-Thinking BI works?
5 Benefits of a Forward View of your Business Learn More

WHITE PAPER: SugarCRM

SugarCRM In-Depth Case Study: Redglaze Group
What if you could give everyone that touches customers an indispensable tool that optimizes business process, removes data silos and makes customer interaction extraordinary? See how Redglaze Group uses Sugar to give individuals access to critical data, optimize processes and improve efficiencies. View Now>>

Vulnerability in embedded Web server exposes millions of routers to hacking
A serious vulnerability in an embedded Web server used by many router models from different manufacturers allows remote attackers to take control of affected devices over the Internet. Read More
 

Hotel group asks FCC for permission to block some outside Wi-Fi
The U.S. Federal Communications Commission will soon decide whether to lay down rules regarding hotels' ability to block personal Wi-Fi hotspots inside their buildings, a practice that recently earned Marriott International a $600,000 fine. Read More
 

Holiday blues: 49% of network managers, sysadmins expect to work the holidays
Nearly half of IT pros will be working or on call over the holidays to troubleshoot network, security and app problems, according to net management vendor Ipswitch. Read More
 


WHITE PAPER: IBM Corporation
 
Gartner Magic Quadrant for Integration Brokerage
In this first-release MQ, Gartner evaluates providers on service delivery, B2B Network/Collaboration, Integration Functionality and success in capitalizing on vision. Learn More

Tor warns of possible disruption of network through server seizures
The Tor project said it could face attempts to incapacitate its network in the next few days through the seizure of specialized servers. Read More
 

The hottest wireless technology is now sound
There's been a surge of innovations that harness sound waves to transmit data and do other creative things. Here's what's going on. Read More
 

From M2M to IoT: Old industries must learn new tricks
The way connected devices are evolving in industry, where they've been used for years, says a lot about why IoT has the potential to be something very big. Read More
 

China is key to North Korean Internet, but maybe not hackers
A request to the Chinese government by U.S. diplomats to help crack down on North Korean hacking underlines the important role that China plays in keeping the dictatorship online. Read More
 

 

Digital Spotlight: Mobile Security
 

Read how to make your workers smart about mobile security by moving beyond policies and penalties and embracing an approach designed to identify and correct specific problem behaviors.

View the Digital Spotlight now. [Registration required]

Is your IT department a great place to work?
 

Computerworld is seeking to identify the 100 top workplaces for IT professionals for our 22d annual Best Places to Work in IT list.

We invite Computerworld readers, HR and PR professionals and other interested parties to nominate organizations, in any industry, that they think are providing great working environments for IT employees, including challenging work, fair pay and ample training opportunities.

Nominate a company now through Dec. 31, 2014.

Computerworld's Digital Magazine
 

Computerworld's monthly Digital Magazine showcases articles, analysis and commentary on important trends in enterprise IT, in core departments such as News Analysis, Features, Opinions and Shark Tank. The new digital format offers seamless navigation, with easy scrolling and zooming, and links to useful related stories. The December edition is available now [Registration required]:

To read the issue, click here.

Free Shark Tank T-shirt
Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it gets published, you get a sharp Shark shirt. Shark Tank FAQ

Internet of Things: Get the latest news!
Our bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the Internet of Things (IoT). Subscribe now and stay up to date!

Join the Computerworld conversation on Google+
Be sure to add Computerworld to your Google+ circles to keep track of breaking news, features, blogs, tech reviews and career advice.

Computerworld Job Board
Search multiple listings now and get new job alerts as they are posted.


 
 

Get more IT peer perspective online:
LinkedIn Group | Facebook | Twitter

You are currently subscribed to computerworld_networking as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2014 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@computerworld.com. **

 


 

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:25 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive