In This Issue:
1. Editor's Note: What The Polls Say We're Doing On Online
2. Today's Top Story
- Identity-Theft Keylogger Identified
- FBI: Businesses (Still) Reluctant To Report Cyberattacks
- FCC Rule On Internet Calls Said To Encourage Hacking
- Hackers Keep Sniffing For Buggy Veritas Backup Software
3. Breaking News
- Windows 2000 Users Dealing With Wave Of Bugs
- Most Spam Sent From Zombies
- Employees Reportedly Spend One Hour Per Day On Personal
- Electronic Discovery Software Delivers Huge Award In Patent Suit
- Sun To Resell VMware Virtualization Software
- Opera Offers Web Browsing For Low-End Mobile Phones
- Global Cellular Revenue To Reach $570 Billion In 2005
- Flarion Buy Solidifies Qualcomm's Wireless-Broadband Position
- Yahoo Combines Chinese Operations With Auctioneer Alibaba.com
- New Cell-Phone Services Will Offer Sports, Hispanic
Programming, And Mickey Mouse
4. In Depth: Personal Tech & Reviews
- Windows Vista Beta 1: A Guided Tour
- Test Drive: Internet Explorer 7 For XP Beta 1
- Hands On: Services-Oriented Architecture Demystified
- F-Security's Antivirus Client Security
- Hawking Technology's WiFi Locator
5. Voice Of Authority: Redefine Your IT Mind-Set At Fall Conference
6. White Papers: The Secure Console: Browser-Based, Command-Line
Interface, or Both?
7. Get More Out Of InformationWeek
8. Manage Your Newsletter Subscription
Quotes of the day: Lazy Daze
"People who throw kisses are hopelessly lazy." -- Bob Hope
"Progress isn't made by early risers. It's made by lazy men
trying to find easier ways to do something." -- Robert Heinlein
1. Editor's Note: What The Polls Say We're Doing On Online
A few weeks ago we asked for your input on whether we should
change the delivery timing of this newsletter. More than 1,000 of
you were good enough to respond (1,043), and, as promised, here
are the results:
Same time as now: 4 a.m. Eastern time--66%
Noon Eastern time is OK--18%
In keeping with your preferences, we won't change the delivery
time of the newsletter. Thank you for pointing us in the right
Some of you wrote in with an interesting suggestion: Keep the
current newsletter delivery time, but offer an afternoon update.
We like that idea, but we don't want to spam anyone. So we are
considering working that option into a new service we hope to
debut shortly--a customized news alert that enables you to pick
the topic, day, and timing of when you'd like to receive news
updates. We'll have more details soon.
You can go to my blog entry, where I explore the second survey, from comScore Networks, which
posits that blogs have become so popular that they now rival
mainstream media publications in influence and reach.
Sunbelt Software has identified the keylogging spyware that's
feeding sensitive personal information to an identity-theft ring.
The FBI confirms it has been in contact with Sunbelt and is
looking into the company's findings.
Related Stories: FBI: Businesses (Still) Reluctant To Report Cyberattacks
Roughly 20% of businesses report computer intrusions annually, a
figure the agency believes is low. Director Robert Mueller urged
businesses to step forward, promising greater sensitivity from
the FBI in return.
FCC Rule On Internet Calls Said To Encourage Hacking
While the FCC agreed with a request from law enforcement to
affirm that VoIP falls under the purview of a wiretapping
statute, alarmed industry groups warn that compliance will create
more vulnerabilities and opportunities for hackers.
Security analysts say the latest vulnerabilities prove that
Windows 2000, no matter where it is in Microsoft's support cycle,
will continue to be a target for attackers.
Most Spam Sent From Zombies
For the third straight month, most of the spam sent across the
Internet originated on zombie machines, hijacked computers
remotely controlled by spammers, a mail security firm says.
Flarion Buy Solidifies Qualcomm's Wireless-Broadband Position
By acquiring Flarion Technologies, Qualcomm will instantly
strengthen its position in the booming wireless-broadband market,
as well improve its international offerings and position itself
for the coming battle for dominance in mobile digital-broadcast
Yahoo Combines Chinese Operations With Auctioneer Alibaba.com
Yahoo on Thursday said it would pay $1 billion for a 40% share of
Chinese company Alibaba.com and would fold its China operations
into the online auctioneer, forming a joint Internet company that
would challenge leading marketplace eBay and No. 1 search engine
Baidu.com in the growing market.
Does your company have a specific strategy in place to combat
identity theft, and why or why not?
Enhance Your Networking Skills Network Computing is offering a series of immersive
learning programs designed for network professionals and
engineers. Through a combination of in-depth classroom-based
instruction and hands-on labs, you'll learn the skills necessary
to build, deploy, and manage today's leading-edge technologies.
InformationWeek's New And Improved Search--Give It A Try!
Our upgraded search function now helps you find a wider array of
useful articles, stories, and related content from the entire
TechWeb network, with easy-to-use, categorized search results.
Improved search also gives you eight new ways to find articles
Want to win an expense-paid trip to InformationWeek's Fall
Conference, Sept. 18-21 in beautiful Palm Springs, featuring
Wal-Mart CIO Linda Dillman? Just read Bob Evans' column and
answer a few questions, and you're in the running!
Secure console management has become an essential requirement for
operating today's complex data centers and managing assets across
distributed environments. IT organizations need to give their
core team of skilled sys admins ready access to critical
business-computing resources on an anywhere/anytime basis.
Note: To change your E-mail address, please subscribe your new address and unsubscribe your old one.
Keep Getting This Newsletter
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. Thanks.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Infographic: The State of DevOps in 2017Is DevOps helping organizations reduce costs and time-to-market for software releases? What's getting in the way of DevOps adoption? Find out in this InformationWeek and Interop ITX infographic on the state of DevOps in 2017.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.