Network World Voices of Networking Alert |
| |
|
Expectations are high and steadily growing for how serverless computing can revolutionize the way organizations approach development and innovation. Read More ▶ |
|
| White Paper: Palo Alto Networks Exploit kits, which first became popular in 2006, are used to automate the exploitation of vulnerabilities on victims' machines, most commonly while users are browsing the web. Over the past decade they have become an extremely popular means for criminal groups to distribute mass malware or remote access tools (RAT), because they lower the barrier to entry for attackers and can enable opportunistic attacks at scale. Read More ▶ | A hacker in Turkey has been trying to encourage distributed denial-of-attacks by making it into a game, featuring points and prizes for attempting to shut down political websites. Read More ▶ |
| The U.S. Department of Transportation is considering making it mandatory for airlines to inform passengers before purchasing tickets if they will allow voice calls using mobile wireless devices on board their aircraft, thus hoping to placate customers who could object to having co-passengers talking away on their phones in an enclosed space. Read More ▶ |
| | Pundits who got it wrong explain why ... or deny that they did Read More ▶ |
| Georgia's secretary of state says the state was hit with an attempted hack of its voter registration system from an IP address linked to the federal Department of Homeland Security. Read More ▶ |
| Hiring is a challenge for CIOs, and it won’t get much easier in the coming year, particularly for IT departments that are trying to fill key security and networking roles. Read More ▶ |
| Results of a high-tech research project to be released next week promise to finally unravel much of the remaining mystery of a 2,000-year-old astronomical calculator. Read More ▶ |
| Video/Webcast: Keeper Security Passwords are the most basic form of protection, yet they are also the most susceptible to outside hacking because of poor employee practices. Whether employees write them down, simplify them, or neglect to change them, passwords are an easy target for outside hacking. This video discusses password best practices, and what an companies can do to manage their employees password. Read More ▶ | Join The Network World Communities As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook ▶ Network World on LinkedIn ▶ | SLIDESHOWS 20 years ago: Hot sci/tech images from 1996 Read More ▶ | Most-Read Stories |
|
|
|