Feb 24, 2011 (01:02 PM EST)
80% Of Browsers Have Known Vulnerabilities

Read the Original Article at InformationWeek

InformationWeek Daily: Issue Highlights    Manage Subscription  |  Contact Us

TOP STORY: 80% Of Browsers Have Known Vulnerabilities

MORE NEWS: Microsoft Releases Windows 7 SP1

ANALYTIC REPORT: Best Practices: IPv6 Transition

WHITEPAPER: 5 Steps to Transforming the Data Center

SLIDESHOW: 12 Worst Tech Predictions Of All Time

VIDEO: Desktop Virtualization Benefits

BLOG: Verizon iPhone Sales Disappoint

WEBCAST: 5 Key Considerations When Investing in a New Solution

RESOURCES: Attend Cloud Connect


InformationWeek Daily

InformationWeek Daily

 

Thursday, February 24, 2011

 

QUOTE OF THE DAY...
"By cultivating the beautiful we scatter the seeds of heavenly flowers, as by doing good we cultivate those that belong to humanity." -- Robert A. Heinlein

INFORMATIONWEEK.COM   |   NEWS   |   ANALYTIC REPORTS & WHITEPAPERS   |   BLOGS   |   WEBCASTS   |   RESOURCES

TODAY'S TOP STORY

80% Of Browsers Have Known Vulnerabilities
Most problems are caused by insecure plug-ins, such as Java, Adobe Reader, QuickTime, and Flash, finds Qualys.

RELATED INSIGHTS
Browser Guide: Choosing The Best Standard For Business
Review: Google Chrome 9 Unleashes New Features
Microsoft Internet Explorer 9 RC Arrives

ALSO SEE

Microsoft Releases Windows 7 SP1
Service Pack 1 for Windows 7 and Windows 2008 R2 bundles all bug fixes to date, but includes few new features.

Global CIO: SAS Takes On IBM, As IT Meets Marketing
Analytics is changing marketing, as recent M&A activity shows.

Apple Shareholders Reject Steve Jobs Succession Plan
Annual meeting sees company stockholders vote down a call for a formal arrangement that would identify potential replacements if Jobs' health deteriorates further.

HP Upgrades EliteBooks, ProBooks For Businesses
Intel's second-generation Core processors, as well as a Celeron processor option, will available on the business notebooks.

SAP Announces Blockbuster BusinessObjects Upgrade

Business intelligence and information management suites are synchronized and enhanced in a feature-packed release highlighting real-time analysis.



Apple MacBook Pro Expected With Light Peak

The company's updated MacBook Pro should be the first to bring Intel's Light Peak technology to market.



Meaningful Use Big Business For Healthcare Consulting Firms

IT consulting firms are helping healthcare providers assess health IT systems for potential HIPAA violations and achieve the fine points of meaningful use compliance.



TeleTech Offers Crowdsourcing, Simulations For Training

The business process outsourcer says the new educational tools can cut training time and produce better workers.



FBI Redesigns 'Most Wanted' Site

The agency has enhanced its search and other tools to improve the way people can help it locate fugitives and missing persons.



Apple Event Ignites iPad 2 Speculation

The iPad 2 is expected to make its debut at a special event Apple is hosting in San Francisco on March 2, along with some other surprises.



Few Businesses Use Social Media For Disaster Recovery

Only about 25% of businesses have added social media like Facebook or Twitter to their disaster recovery and business continuity plans, a survey by Janco Associates reveals.



  Digital Issue  
DOWNLOAD INFORMATIONWEEK'S GOVERNMENT DIGITAL ISSUE

Federal agencies are making progress on the Obama administration's Open Government Directive, but there's still a long way to go. We give you our list of top priorities.

ALSO: Can the tech industry's ambitious plan to improve government efficiency work? No way, says InformationWeek Government editor John Foley.

Plus much more, exclusively in our Digital Issue

DOWNLOAD NOW (Registration Required)


 


ANALYTIC REPORTS & WHITEPAPERS

FEATURED REPORTS

Best Practices: IPv6 Transition
IPv4 is not extinct, exactly, but it may as well be. If you don't act to add IPv6 capability to your network, you're not only limiting the growth and innovation potential of your business, you may also be turning away thousands of customers. In this report, we'll discuss strategies and provide an in-depth look at three real-world deployment models.
Download Now (Registration Required)

Featured Report

Research: 2011 Backup Survey
There's no excuse for your backup strategy being stuck in a rut. Today's system administrators can take advantage of myriad new and improved data protection technologies, including disk-to-disk backup, virtual tape libraries, data deduplication and cloud-based backups. These and other methods can help overcome two big problems: continued use of backup tapes as an archiving strategy (bad idea) and a lack of data protection for branch offices and remote employees.
Download Now (Registration Required)

Featured Report

MORE ANALYTICS

spacer spacer spacer

FEATURED WHITEPAPERS

5 Steps to Transforming the Data Center
Preparing a data center for the future requires automating the management tasks that consume most of an IT administrator's time. Check out this roadmap to make your data center truly efficient by aligning people, processes and technology. Download Now

Web Searches from Blackhat SEO to System Infection
Every business on the Web wants attention. That's why Search Engine Optimization (SEO), an orchestrated attempt to attract visitors to a site, is so popular. But be warned: Cybercriminals increasingly use SEO to deliver malware to unsuspecting Web surfers' systems. This profitable practice, called Blackhat SEO, is simple to perpetuate, yet effective and dangerous. Find out how to protect your systems. Download Now

MORE WHITEPAPERS AT


  InformationWeek on Your iPad!  
INFORMATIONWEEK IS NOW ON YOUR iPAD!

It's easier than ever to get the business technology news and analysis you need with the InformationWeek Select iPad application, which provides a daily, easy-to-read compendium of stories hand selected by InformationWeek's editors.

Download the iPad app now so that you don't miss the latest reporting and insights from InformationWeek's award-winning editors!


 

MULTIMEDIA

SLIDESHOWS


12 Worst Tech Predictions Of All Time
The epic history of technology is littered with some incredibly lousy prophecies, often made by some very smart, very successful -- and very wealthy -- executives. We trolled the timeline of technology to find the most misguided (and in some cases just plain crazy) calls in the industry's storied past, from the telephone to television to YouTube.   View Now


ALSO SEE

Clicking Through Drupal 7's Features

NFC, Pico & Audio: Mobile Chips In Full View

MORE SLIDESHOWS

spacer spacer spacer

VIDEOS


Desktop Virtualization Benefits
Enhancing Security and Flexibility Through Desktop Virtualization   Watch

ALSO WATCH

Big Ideas at the Mobile World Congress

Picochip Demos Streaming Video Over 4G

MORE VIDEOS

spacer


TODAY AT THE BLOG


FEATURED BLOG
Featured Blogger Verizon iPhone Sales Disappoint
By Ed Hansberry
Despite record online sales for the Verizon iPhone, overall sales have been disappointing to those at Apple. Before you read too much into that though, there are a few things to consider.

ALSO SEE
Xerox Offers Mid-Range SMB Color Toner Printers
By Lamont Wood
High-price is justified by high print quality, says Xerox. The jury remains out on that, but the refill toner price is, as usual, no bargain.

Virtual PBX Offers IP Solution
By Paul Korzeniowski
Movement from traditional to IP telephony services has been taking place for several years. A leader in traditional voice services, Virtual PBX has now broadened its offerings, so they work better with IP.

This Isn't The Update You Are Looking For
By Ed Hansberry
Even as Windows Phone 7 was launching late in 2010, everyone knew there was an update on the horizon that at a minimum would bring copy and paste to the platform. On Monday Microsoft started rolling out the first update for its mobile platform, but this won't have copy and paste, or anything else you will really use either.

Security Coming To Mobile And Embedded Devices
By George Hulme
Security firm McAfee expects 50 billion mobile and connected embedded devices by the year 2020. And guess who is promoting new tools promising to protect them. But is this a layer of protection we are going to need?

Hacks From China Strike Canadian Government
By George Hulme
CBC is reporting that attacks from IP addresses based in China have managed to successfully breach networks within the Finance and the Treasury Board of Canada, as well as Defence Research and Development Canada. The attack is the latest in a string of attacks aimed at high level government agencies.

WEBCASTS

5 Key Considerations When Investing in a New Solution
Join Josh Duncan and Floyd Strimling from Zenoss for a lively discussion on the future of monitoring the datacenter -- from the physical, to the virtual, to the Cloud.

It happens Wednesday, March 2, 2011 -- Time: 11:00 AM PT / 2:00 PM ET More Information & Registration

Automatically fix broken links when you move or rename files!

Patented LinkFixerPlus is the first application that automatically fixes broken links in Excel, Word, PowerPoint, Access, Acrobat, AutoCAD, MicroStation, PageMaker, InDesign, HTML and other files when performing data migrations due to: server consolidation, server name changes, path name changes or folder reorganizations.

Click for your free trial now!


RESOURCES AND EVENTS

Attend Cloud Connect
Learn how to take the next step in cloud computing at Cloud Connect, the leading conference and expo for IT professionals, executives, and developers.
It happens in Santa Clara, Calif., March 7-10.

2011 InformationWeek Government IT Innovators
For the past 22 years, InformationWeek has honored the country's most technologically innovative companies with its prestigious InformationWeek 500 ranking. Now in its third year, InformationWeek's 2011 Government IT Innovators program will feature the most innovative government IT organizations in the 2011 InformationWeek 500 issue and on InformationWeek.com.
Nominations Accepted Until April 29, 2011 -- Register Today!


This e-mail was sent to %%email%%

InformationWeek Daily Newsletter
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030


To subscribe to our other newsletters, change your e-mail
address or format (Text/HTML) or to unsubscribe, click here

Keep Getting This Newsletter
Don't let future editions of InformationWeek Daily go missing.
Take a moment to add the newsletter's address to your anti-spam white list:
email@techwebnewsletters.com

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.

GET MORE OUT OF INFORMATIONWEEK
Keep up with the latest news, insights and trends as InformationWeek reports them:

newsletters
Facebook
Twitter