'Storm' Trojan Hits 1.6 Million PCs; Vista May Be Vulnerable
In This Issue: Storm' Trojan Hits 1.6 Million PCs; Vista May Be Vulnerable
1. Editor's Note: Googletarianism Rampant
2. Today's Top Story
- 'Storm' Trojan Hits 1.6 Million PCs; Vista May Be Vulnerable
- One Hacker Kit Accounts For 71% Of Attacks
- McAfee Update Chokes Off Lotus Notes
- Microsoft To Offer 'Simpler' Antivirus Service For Vista And Discounts For Testers
3. Breaking News
- Microsoft May Have Mistakenly Pegged 2.6 Million As Pirates
- Appeals Court Shoots Down Copyright Challenge
- Vista Won't Add To PC Prices
- Intel Upgrades Centrino With 802.11n
- Oracle Beefs Up Linux Support With Management Tools
- HP's 2006 Recyclables Weigh As Much As 600 Jumbo Jets
- HP Forms New Software Unit For Server And Storage Management, Virtualization
- U.S. Stock Futures Point Flat; Tech Earnings In Focus
- Insurer Will Let Members Access Their Health Data From Cell Phones
- Technology Is Taking Over Americans' Lives
4. In Depth: Blogging
- Microsoft Pays Blogger To 'Correct' Wikipedia Entry
- Pew Report Records Rise Of Blogosphere Political Elite
- Blog Traffic Triples At Newspapers' Web Sites
- Yahoo Buys Community Site MyBlogLog
- Placeblogs Cast A Narrow Net
- Like A Product? USuggest Will Pay For Your Recommendation
5. Voice Of Authority
- Good Riddance To IBM Workplace
6. White Papers
- The Challenge Of Depicting Complex Information Systems
7. Get More Out Of InformationWeek
8. Manage Your Newsletter Subscription
Quote of the day:
"Don't knock the weather. If it didn't change once in a while, nine out of 10 people couldn't start a conversation." -- Kin Hubbard
1. Editor's Note: Googletarianism Rampant
From in-game advertising to video music ads to helping map the universeis there anything Google doesn't want?
Google watchers over the last couple of years have predictedgenerally correctlythe company's widening influence on the entire IT/telco/advertising continuum, and there's no reason for the predictions to grow more cautious now. Even the company's perceived vulnerabilities have, in many cases, dwindled if not evaporated.
Sure, a severe advertising downturn would be a blow, and ongoing security issues are increasingly going to demand answers, particularly as Google pursues a larger enterprise presence. But a patent suit came up empty even as Google's share of the search market continues to climb.
Google Web apps are starting be perceived as a challenge to Office's longtime (like, forever) dominance of that market, and its calendar may be what breaks Google ahead of Yahoo in those arenas where Yahoo still leads. Plus, Fortune's now rated Google as the best place in the country to work. According to some sources, even terrorists turn to Google.
That last item isn't Google's fault, of course, and one could almost bet that the good guys are using the same Google tools on their side of the conflict.
No wonder the president called it "the Google"it certainly looks more and more like the company that's the face of the future. Until, of course, the next one comes along and puts Google in its sights. Google watchers are undoubtedly watching for that company even nowand using Google to do so.
InformationWeek To Go
You're going mobileand so is InformationWeek. Our breaking news headlines are now available in WAP format for mobile phone subscribers. See our mobile headlines page and submit your subscription request at any InformationWeek page, under the "IW On The Go" logo.
Managing Security Complexity
Examine how more than 2,000 technology and security professionals are managing complexity and protecting mission-critical systems in the ninth annual Global Information Security Survey, a joint research project between InformationWeek Research and Accenture.
Learn what more than 500 companies are planning regarding their companies' wireless and mobile computing strategies in InformationWeek Research's Wireless/Mobile Computing report.
Yahoo Buys Community Site MyBlogLog
MyBlogLog provides people with the online tools to create a profile and associate it with their blogs, enabling registered users of the site to form communities around those blogs.
Good Riddance To IBM Workplace
Lotus killed the poorly defined Workplace application this week, and David DeJean couldn't be happier, both with that and with other changes he detected in Lotus' product direction while attending Lotusphere.
6. White Papers
The Challenge Of Depicting Complex Information Systems
Computer networks, process/workflow models, and conceptual designs are complex collections of data and relationships. Each object has unique information and occupies a special place in a hierarchy. Nonetheless, systems are depicted in flat, unconnected diagrams with no access to external data.
Note: To change your E-mail address, please subscribe your new address and unsubscribe your old one.
Keep Getting This Newsletter
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. Thanks.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Infographic: The State of DevOps in 2017Is DevOps helping organizations reduce costs and time-to-market for software releases? What's getting in the way of DevOps adoption? Find out in this InformationWeek and Interop ITX infographic on the state of DevOps in 2017.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.