Black Hat: Mac OS X Rootkit Debuts - InformationWeek
Government // Enterprise Architecture
02:22 PM

Black Hat: Mac OS X Rootkit Debuts

Issue Highlights:
InformationWeek Daily Newsletter

TOP STORY: Black Hat: Mac OS X Rootkit Debuts

MORE NEWS: Microsoft CEO Says 'Nobody Gets' Yahoo Deal

ANALYTIC REPORT: State of Enterprise Storage 2009

WHITEPAPER: Best Practices for Disaster Recovery and Continuity

BLOG: BlackHat Bombshell #2: iPhones And Other "GSM" Phones Open To SMS Hack

WEBCAST: Business Objectives Driven SAP Application Management Services

RESOURCES: VoiceCon San Francisco

InformationWeek Daily

Powered By The InformationWeek Business Technology Network

 Friday, July 31, 2009 


Download Network Computing's Digital Issue
InformationWeek's Green Issue Here's how WAN optimization appliances and app delivery controllers can deliver what you need. Find out about that and more in Network Computing's first digital issue, part of InformationWeek's Green Initiative to reduce our carbon footprint.

Download Now (Registration required)


Black Hat: Mac OS X Rootkit Debuts
The development of a proof-of-concept rootkit for Mac OS X reinforces the fact that security concerns aren't just for Windows users.

Bombshell From Black Hat: Almost All Implementations Of SSL Are Configured To Give Up Everything
Black Hat: Android, iPhone SMS Flaws Revealed
Black Hat Podcast: Popularity Of Social Nets Puts Spotlight On Dangers Of Cross-Site Request Forgeries
Black Hat: Smart Meter Worm Attack Planned
Black Hat Researcher Cracks Algorithm For Creating Social Security Numbers


Microsoft CEO Says 'Nobody Gets' Yahoo Deal
Steve Ballmer says he was surprised by the market's reaction to the search and advertising partnership but also characterized the deal as "a little bit complicated."

Student On Trial Admits Sharing Music Online

Joel Tenenbaum could face up to $4.5 million in penalties if the RIAA prevails and he is found guilty of illegally downloading 30 songs.

SAP Demos Commitment To Business ByDesign

Enhancements and testing of the software-as-a-service suite indicate that SAP intends to make the offering more broadly available next year.

Carriers Respond To Bans On Texting While Driving

The four major wireless operators agree that the practice is dangerous, but not all believe national legislation is the best way to solve the problem.

Memory Chip Market Recovering

Rising demand and limited supply will boost prices for DDR3 DRAM chips in the second half of the year, iSuppli says.

LG Reveals Latest 'Chocolate' Phone

The handset's 4-inch, high-quality touch screen is geared toward watching videos and viewing Web pages on the go.


"Work helps to preserve us from three great evils -- weariness, vice, and want."

-- Voltaire 


Nintendo Profits Tumble

The lack of blockbuster Wii video-game titles caused Nintendo's profits to plummet 60% in its first quarter.

Covisint Signs Cloud Deal With Texas Doctors Group

Cloud-based platform will allow physicians to access clinical and administrative tools and exchange patient data via a secure portal.

Alcatel-Lucent Reports $19.7 Million Profit

The communications equipment supplier's stock rose on news of its first profit in more than two years.

This issue sponsored by Citrix:
Latest Resources from the Desktop Virtualization Center:
- Three Easy Steps to a Better Desktop
- Desktop Virtualization: Overcome Five Real-World Challenges
- Top Three IT Moves in '09: Reduce IT Costs
- Your Desktop: Reimagined



State of Enterprise Storage 2009
Continuing to throw precious resources at escalating storage and bandwidth demand isn't a strategy, it's a recipe for disaster. Diverse drivers-from environmental concerns to regulation to data security to business continuity-mandate a new path. Are you ready?
Download Now (Registration Required)

Featured Report

8 Storage Automation Questions to Ask
Obtain the critical storage automation questions you should ask before making your purchase.
Download Now (Registration Required)

Featured Report

spacer spacer spacer


Best Practices for Disaster Recovery and Continuity
Do you know how to plan, implement and execute a quick recovery strategy for local accidents and natural disasters? Read more about what you need to think about and the services and resources you'll need to put into place to ensure your company's survival. Download Now

Combining Deduplication and VMWare Disaster Recovery
Cost savings created by using deduplication can make DR feasible in situations in which it may have otherwise been cost prohibitive. Learn what it takes to implement deduplication with VMware DR and how to leverage the replicated data in your DR environment for DR testing and other purposes. Get the white paper today. Download Now



Featured Blogger

BlackHat Bombshell #2: iPhones And Other "GSM" Phones Open To SMS Hack
Posted By David Berlind
With one bombshell already having been dropped at the BlackHat Conference (that most implementations of SSL are configured to give up everything including logins, credit cards, etc.), researchers dropped another one today when they demonstrated how the SMS infrastructures of GSM-flavored operators such as AT&T and T-Mobile are hackable to the point that cell phones can be hacked and their users can be tricked into divulging confidential information.


Corporate Patch Management Lags In Maturity
Posted by George Hulme
If one of the most important disciplines necessary for keeping systems secure is a systematic vulnerability management program, why have so few organizations reached a decent level of maturity in their patch management efforts?

Are Mobile Devices Closing The Digital Divide?
Posted By Ed Hansberry
Mobile devices seem to be closing the digital divide. More and more people are getting online with cell phones, but the uptake is really strong with minorities according to a report by the Pew Internet & American Life Project.

Microsoft Is Following Me On Twitter
Posted By Michael Hickins
I'll admit to experiencing a tiny ego frisson upon reading the email notification that Microsoft News is now following me on Twitter (and since I'll be Tweeting this, I assume someone at Microsoft News will feel the cool pleasure of a python having taken the measure of its prey).

Motorola Delivers Profit, But What About Handsets?
Posted By Eric Zeman
Motorola announced its second quarter earnings and surprised more than a few by turning up a profit. This is certainly a positive sign, but Motorola has yet to deliver a winning handset this year. Or last year, for that matter.


Business Objectives Driven SAP Application Management Services
Attend this webcast and learn how to create an agile & responsive service delivery platform and drive application spend reduction. Speakers from Forrester, Mosaic, and Patni will share with you tips and techniques to structure AMS programs focused on business outcomes. It happens August 5, 2009 / 9:00 a.m. PT/12:00 p.m. ET. More Information & Registration

State of Open Source - Latest InformationWeek Analytics Report:
Lower Total Cost of Ownership by leveraging Open Source. 557 business technology professionals respond to our InformationWeek Analytics State Of Open Source survey. Should you consider and implement Open Source? Find out. Download Now.



VoiceCon San Francisco
IP telephony is being integrated with a new generation of unified communications technologies, services, and applications that will transform how your enterprise does business. Only VoiceCon will help you create the road map for migrating to the next plateau and help you maximize your investment in enterprise communications. Registration is now open for the leading enterprise communications event.
More Info And Registration

ReviewCam: Glue Sniffs @ Social Integration
AdaptiveBlue's Glue lets your social networks follow you around as you traverse the Web. CEO & Founder Alex Iskolde takes InformationWeek through a tour of this technology, showing us how it works in real time.
Watch Our Video

TechWeb Marketplace

InformationWeek Daily Newsletter
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030


This e-mail was sent to %%email%%

Keep Getting This Newsletter
Don't let future editions of InformationWeek Daily go missing.
Take a moment to add the newsletter's address to your anti-spam white list:

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
Digital Transformation Myths & Truths
Transformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll