Latest articles for Network World

Regulators seek to limit security software exports

The comment period on a proposed set of software export restrictions ends next Monday, and the rules, as written, would severely restrict international sales, deployment,…

‘Morpho’ group goes after corporate IP

Symantec has identified a group of cybercriminals, whom they’ve named “Morpho,” as targeting corporate intellectual property for financial gains, with Twitter, Facebook, Apple and Microsoft…

Despite warnings, majority of firms still run some Windows Server 2003

Enterprises are still heavily dependent on Windows Server 2003 even though there were plenty of warnings that support is coming to an end on July…

IEEE group recommends random MAC addresses for Wi-Fi security

According to new recommendations by an IEEE study group, the Wi-Fi protocol needs to be updated to use randomly generated addresses for better security and…

Who’s winning the mobile payments war?

Mobile payments – using your phone instead of a credit card to make purchases at retail locations – has not taken off. Yet.To read this…

Macros big again with cybercriminals

Up to a year ago, most phishing emails were all about tricking users into clicking on malicious links that led to malware downloads. Starting last…

Cyber-extortionists are liars

The good news about cyber criminals who go in for extortion is that they also tend to be liars. The bad news — they’re extremely…

Banks get attacked four times more than other industries

Modern-day criminals are still following Willie Sutton’s example of going after banks “because there’s where the money is.”According to a new report from Websense Security…

Mobile security: the coming battle of hardware versus software

I’m starting to see signs for Apple Pay and Google Wallet everywhere I go. Google just announced its Android Pay platform and deals with AT&T,…

4 reasons why virtual reality isn’t real yet

UK-based virtual worlds research firm KZero projects that 83 million head-mounted virtual reality display headsets will have been sold by 2018, with a consumer market…

Virtual reality gains a small foothold in the enterprise

The rapid growth of the mobile sector has had an unexpected dividend — by bringing down the costs and improving the quality of motion sensors,…

Microsoft, Cisco, Avaya hone their virtual reality strategies

The leading unified communications (UC) vendors are taking a hard look at the opportunities for virtual reality in the conference room or the boardroom. For…

Open source pitfalls — and how to avoid them

It’s hard to imagine a company these days that isn’t using open source software somewhere, whether it’s Linux running a company’s print and web servers,…

10 big myths about Big Data

Big Data has dominated tech news of late. It has been touted as a possible solution for everything from intrusion detection to fraud prevention to…

Ubuntu 13.10: The good, the bad and the ugly

New Touch operating system for mobile devices is still a work in progress The newest release of Ubuntu, dubbed Saucy Salamander, doesn’t offer much in…

Don’t click on these links

Whether you receive a phishing email inviting you to click on a specific link, whether you see the link on your trusted social media sites,…

How to stay one step ahead of phishing attacks

Phishers are upping their game, so end users need to respond accordingly Protecting yourself against phishing attacks used to be relatively easy. Don’t download unexpected…

Is open source encryption the answer to NSA snooping?

When Unisys CISO John Frymier came in to work on Friday, Sept. 6, the phones were ringing, and continued to ring all day. Customers were…

10 reasons to take a Chromebook on the road

10 reasons to take a Chromebook on the road

If you’re trying to decide which device to buy for your next trip because your current laptop is too old, too slow, too heavy and…

10 encryption tips for the enterprise

Whether you’re protecting corporate data from internal leakers, hackers looking to steal money from you and your customers, foreign spies, your own government, or employees…

Fedora adds 3D printing support

Latest version of open source desktop boast several key improvements, but many usability issues remain The latest version of Fedora, nicknamed “Schrodinger’s Cat,” features a…

15 most powerful Big Data companies

The world of big data vendors is divided into two camps. There are the pure-play Big Data startups who are bringing innovation and buzz to…

Telecommuting from paradise

Nine years ago, Francie Tanner was working at a technology consulting company in Dallas. Today, she lives in Anguilla with her family and works as…

Telecommuting from paradise

Nine years ago, Francie Tanner was working at a technology consulting company in Dallas. Today, she lives in Anguilla with her family and works as…

Rating the paradise destinations

What a life, sitting in your beach chair soaking up the sun while working on your laptop. Your main concern is what spf to use…

Telecommuting from paradise

With the right boss and the right broadband, these tech workers relocated to paradise destinations Nine years ago, Francie Tanner was working at a technology…

Big Data jumps to the cloud

Big Data-as-a-Service offers quick, inexpensive, targeted analytics Kevin Walker’s sales team was buried under information. Internal records, news reports, third-party data sources. Take a simple…

10 things we love about Ubuntu 13/5 things we hate

The latest version of Ubuntu, Raring Ringtail, is billed as being business and user-friendly. There are still obstacles to its widespread adoption in the enterprise,…

Ubuntu 13 challenges Windows 8

Ubuntu is becoming a viable desktop replacement for Windows in certain enterprise scenarios The latest version of Ubuntu, Raring Ringtail, is billed as business and…

Ubuntu 13 challenges Windows 8

Ubuntu is becoming a viable desktop replacement for Windows in certain enterprise scenarios The latest version of Ubuntu, Raring Ringtail, is billed as business and…