25 real-life ways people have been hurt using their phones

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Compliance Alert

Apr 01, 2016
Featured Image

Is outsourcing IT worth the compliance risk?

While the feds have certainly put hurdles in place to prevent abuse, outsourcing IT in a highly regulated industry like banking may very well lead to higher standards and quality outcomes. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

25 real-life ways people have been hurt using their phones
T-Mobile CEO John Legere tweets so much that he morphs into a Twitter emoji
Kent State CIO talks about his cloud ambitions, accomplishments, and his new cloud book
Cisco's John Chambers toying with drones in "retirement"
Network World celebrates 30 years
MIT Media Lab defaults to free & open source software
Networking then and now: 1986 vs 2016
5 things you should know about two-factor authentication
Hackers can abuse the iOS mobile device management protocol to deliver malware

White Paper: CommVault

5 Benefits of Disaster Recovery in the Cloud

This paper explores why the cloud is well suited for disaster recovery and what organizations need to consider to ensure that cloud DR is right for them. Read More

Thumbnail Image

25 real-life ways people have been hurt using their phones

Cellphones, landlines conspire to smash, trip up, burn and cut the masses. Read More

Thumbnail Image

T-Mobile CEO John Legere tweets so much that he morphs into a Twitter emoji

T-Mobile CEO John Legere, a ubiquitous and sometimes outrageous presence on social media, has earned himself emoji status at Twitter. Read More

Thumbnail Image

Kent State CIO talks about his cloud ambitions, accomplishments, and his new cloud book

Ed Mahon says cloud enables him to better utilize IT staff, normalize the budget process by focusing on operating expenses, and minimize unused system capacity Read More

Thumbnail Image

Cisco's John Chambers toying with drones in "retirement"

News from startup Airware that it has begun offering full-blown drone packages to enterprises such as insurance company State Farm is indeed interesting, but for purposes of our Network World audience, this is even more interesting: retired Cisco CEO John Chambers (now executive chairman) is one of the company's new investors. Read More

Thumbnail Image

Network World celebrates 30 years

Thirty years ago today we published the first issue of Network World and, needless to say, a lot has happened since then. Read More

Thumbnail Image

MIT Media Lab defaults to free & open source software

Read More

Thumbnail Image

Networking then and now: 1986 vs 2016

Network World turns 30: Comparing the cutting edge in 1986 to where technology stands today Read More

Thumbnail Image

5 things you should know about two-factor authentication

One of the best pieces of security advice any computer expert can give you is to enable two-factor authentication for websites that support it. With password breaches so common nowadays, it could be the one thing that keeps hackers from stealing your identity online. Read More

Thumbnail Image

Hackers can abuse the iOS mobile device management protocol to deliver malware

Researchers from Check Point Software Technologies found that the communication between MDM products and iOS devices is susceptible to man-in-the-middle attacks and can be hijacked to install malware on non-jailbroken devices. Read More

White Paper: CommVault

5 Steps to Migrate Your Applications to the Cloud Stress Free

This paper examines five easy ways to overcome concerns about managing increased data flows, and moving operations to the cloud and offers solutions to each concern. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

The most momentous tech events of the past 30 years

25 real-life ways people have been hurt using their phones Read More

Most-Read Stories

1. DIY: Raspberry Pi can now morph into Amazon Echo voice assistant
2. Techie April Fools’ Day – in pictures
3. Is the Cisco 6500 Series invincible?
4. Microsoft is reported to announce Ubuntu Linux runs on Windows 10
5. 19 free cloud storage options
6. 9 new features in Windows 10
7. MIT Media Lab defaults to free & open source software
8. Arista takes on Cisco, Juniper at routing
9. 9 ways technology will change within the next 10 years
10. 7 free Wi-Fi stumbling and surveying tools for Windows and Mac
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Compliance Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.