Editor’s Note

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Daily News Alert AM

Jun 15, 2017
Featured Image

Crash Override: Malware that took down a power grid may have been a test run

Meet Crash Override, aka Industroyer, malware designed to attack power grids and responsible for the partial power outage in Kiev. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Editor’s Note
61% off Jackery Bolt 6,000mAh Power Bank with Built-in Lightning and Micro USB Cables - Deal Alert
DHS and FBI issue alert about North Korean 'Hidden Cobra' hackers
Imagination adds safety, resilience to processor for IoT
Amazon transforms data into bricks
Nokia rolls out its first 'petabit-class' router
7 must-have network tools
43% off Dyna-Glo DGO1176BDC-D Vertical Offset Charcoal Smoker - Deal Alert
SD-WAN: What A Difference A Year Makes
Most acute storage pain points, letdowns

White Paper: Sophos Inc

Exploits. Intercepted.

Exploits are one of the main techniques used by cybercriminals to spread malware. They take advantage of weaknesses in legitimate software products like Flash and Microsoft Office to infect computers for their criminal ends. A single exploit can be used by myriad separate pieces of malware, all with different payloads. Read More

Editor’s Note

Welcome, subscribers to Computerworld’s Internet of Things and Networking newsletters, InfoWorld’s Network Report newsletter, and CIO’s Network newsletter. We’ve consolidated our newsletters across the IDG Enterprise websites so readers can get the key stories on their topics of interest from a single source for each topic. In this case, that is the Network World Daily News Alert newsletter. Enjoy! Read More

Thumbnail Image
DealPost

61% off Jackery Bolt 6,000mAh Power Bank with Built-in Lightning and Micro USB Cables - Deal Alert

With built-in lighting & micro-USB cable and an open USB port, Jackery Bolt can charge up to 3 devices at once. Charge your latest iPhone, iPad, Android phone, bluetooth speaker or other USB devices whenever & wherever with a powerful 6,000 mAh. Read More

Thumbnail Image

DHS and FBI issue alert about North Korean 'Hidden Cobra' hackers

DHS and FBI warn about North Korean 'Hidden Cobra' hackers, give details about the group’s DDoS botnet DeltaCharlie. Read More

Thumbnail Image

Imagination adds safety, resilience to processor for IoT

Chip designers are applying industrial safety design techniques to their processor cores so that they can get themselves out of trouble when a fault occurs. Read More

Thumbnail Image

Amazon transforms data into bricks

Amazon is opening physical stores, but it is using data to change the game. Read More

Thumbnail Image

Nokia rolls out its first 'petabit-class' router

With internet traffic set to triple over the next five years, Nokia says the time is right for a new range of high-end routers that can boost core capacity by a factor of six. Read More

Thumbnail Image
INSIDER

7 must-have network tools

IT pros who have used these SD-WAN, management, monitoring and analyzing tools rave about them. Read More

Thumbnail Image
DealPost

43% off Dyna-Glo DGO1176BDC-D Vertical Offset Charcoal Smoker - Deal Alert

Has dad always wanted a charcoal smoker? This one from Dyna-Glo averages 4 out of 5 stars on Amazon and is currently discounted 43% to just $124.44. Read More

Thumbnail Image

SD-WAN: What A Difference A Year Makes

Enterprises want the benefits of lower operational costs and greater agility that are promised with SD-WAN, but they don’t want to compromise on performance or security. Read More

Thumbnail Image

Most acute storage pain points, letdowns

Things don’t always go as planned with new technologies. Two new research reports document the struggles, disappointments and false starts that enterprise storage pros wrestle with as they modernize their infrastructure for digital business. Read More

White Paper: Sophos Inc

Firewall Buyers Guide

With firewalls becoming increasingly complex, buying one can be a confusing experience. And even when you've identified requirements you need for your firewall, trudging through each vendor's website and datasheets is a time-consuming process. This guide has been designed to make finding the right firewall easy for you. It pulls together the critical capabilities and features that all firewalls should have. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

12 top tech fields of the future

Hottest news from OpenStack Summit Read More

Most-Read Stories

1. Top 10 DevOps tools
2. What to do about WannaCry if you’re infected or if you're not infected
3. Apple to unveil new iPad Pro while axing the iPad Mini
4. IT jobs bound for extinction
5. 10 most in-demand tech skills
6. Richard Stallman: Windows OS is malware
7. 18 free cloud storage options
8. Building Linux-powered devices, part 1: Making my Linux-only world a reality
9. Reporters dox WannaCry ransomware kill switch guy no good deed goes unpunished
10. 6 free network vulnerability scanners
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Daily News Alert AM as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.