Friday, November 19, 2010

39 free security software tools; Chrome tops 'Dirty Dozen' vulnerable apps list

Google Chrome tops 'Dirty Dozen' vulnerable apps list | Expert rebuts Bit9's "Dirty Dozen" shot at Chrome

Network World Compliance

Forward this to a Friend >>>


39 free security software tools
Security software is a real free-for-all these days. Sure a few strings might come attached -- some free anti-virus software and online scanners are strictly for personal use and you might need to put up with vendors regularly enticing you to upgrade for more security bells and whistles. But free and open source tools - from vulnerability assessors to packet analyzers to troubleshooting software -- can be had, and even the hackers trying to break into your network are fond of many of them. Read More


WHITE PAPER: Riverbed

An In-Depth Look at ROI
In this whitepaper, Riverbed discusses its compelling and powerful return on investment in hard dollars, and a way to leap past the obstacles preventing you from reaching your IT objectives. Read now!

In this Issue


WHITE PAPER: Oracle

Oracle Business Intelligence Enterprise Edition
This paper offers in-depth insights into Oracle business intelligence systems, including 11g design, BI server, analysis and reporting, BI interactive dashboard, scorecard and strategy management, and much more. Learn more

Google Chrome tops 'Dirty Dozen' vulnerable apps list
The Google Chrome browser has earned the dubious distinction of being named the most vulnerable application on the "Dirty Dozen" list of 12 applications with the most discovered software flaws requiring security updates and notifications from January through mid-October. Read More

Expert rebuts Bit9's "Dirty Dozen" shot at Chrome
The "Dirty Dozen" list most-vulnerable applications for 2010 from security vendor Bit9 this week puts the Google Chrome browser at the top. Now into the resultant debate steps Marc Maiffret, security expert at eEye Digital Security, with a love song for Google Chrome. Read More

A is for Authentication: ABCs of IT [video]
Network World's resident puppet instructors, I.T. Jinglehopper and Jackson, are back to explain the IT term authentication, the factors of authentication, and what it means for the world of data security. Read More

Admin Passwords are the Achilles Heel of Security
Passwords are the predominant means of securing sensitive data, and that is why there are established best practices defining password policies. Sadly, though--the most critical data is often less secure because Admin passwords function outside of those policies and are rarely changed or updated. Read More

McAfee CEO: Intel acquisition not about silicon
In town for an executive summit event at the Steam Whistle Brewery, McAfee Corp. (NYSE: MFE ) CEO Dave DeWalt told customers and partners he believes Intel Corp. 's (NASDAQ: INTC ) blockbuster acquisition of the security vendor will create exciting possibilities. Read More

Dell offering first encryption product
Dell Wednesday announced its first endpoint encryption product, along with the possibility of factory installation on certain Dell PCs. Read More


WHITE PAPER: Socialtext

Web-Oriented Architecture is Changing Enterprise IT
Companies want to surface key events from traditional systems of record inside social applications where employees can collaborate and take action to improve core business processes. This paper discusses the trend and requirements necessary to build an enterprise architecture to perform the integration. Read now!

Encryption adoption driven by PCI, fear of cyberattacks
A survey of more than 900 IT managers shows that adoption of encryption in their organizations is being driven by two main factors, anxiety about possible cyberattacks and the need to meet the payment-card industry (PCI) data security standards. Read More

Protecting card data at the point of sale
Best methods for navigating the POS security standard minefield Read More

You Gotta Keep Em Separated
Segmentation is a key strategy for meeting PCI DSS 2.0 Read More

China telecom operator denies hijacking Internet traffic
China's largest fixed-line phone carrier has denied it hijacked worldwide Internet traffic this past April following a U.S. government report that said the company had redirected network routes through Chinese servers. Read More

Gartner: Security policy should factor in business risks
Understanding the business risk posed due to security threats is crucial for IT managers and security officers, two analysts have claimed. Read More

Hackers exploit royal engagement searches
The official announcement of Prince William's engagement to Kate Middleton happened less than 24 hours ago, but that hasn't stopped hackers exploiting web users search the net for the latest news about the happy couple. Read More


WHITE PAPER: Oracle

Oracle Exadata: A Data Management Tipping Point
This White Paper describes Oracle's Exadata V2 solution In this second version of its newest platform, Oracle not only provides the latest technology in each part of the data-management architecture, but also integrates them under the full control of one vendor, with a unified approach to leveraging the full stack. Learn more

Intrusion detection honeypots simplify network security
Low-cost, low-fuss honeypots are highly effective early-warning systems against external attacks and insider threats; KFSensor, HoneyPoint, and Honeyd offer safety, ease, and flexibility Read More

Users defy security guidelines on smartphones
Many employees break security guidelines over mobile phones Read More

Experts: Stuxnet changed the cybersecurity landscape
The appearance of the Stuxnet worm in June should serve as a wake-up call to governments and businesses, especially those relying on Internet-based industrial control systems, a group of cybersecurity experts told U.S. lawmakers Wednesday. Read More

Adobe patches under-attack Reader bug
Adobe today issued an emergency update for its popular Reader PDF software that patched two critical vulnerabilities, including one attackers have exploited for weeks. Read More

Hackers, spammers will target Facebook Messages, say experts
Facebook's revamped Messages will be a very attractive target for spammers, scammers and malware makers, security experts said today. Read More

X-Ray Body Scanner Hubbub: The Naked Truth
This week's uproar over the Transportation Security Administration's (TSA) use of full-body scanners in U.S. airports shows no signs of easing, as privacy advocates, airline pilots, and grass-roots groups are up in arms over new security-screening measures that opponents find far too intrusive. Read More



Fill out a survey, get rewarded

Get a free Starbucks gift card for participating in a Network World survey about application performance management best practices. Research firm NetForecast is surveying enterprises about APM practices for an upcoming Network World article. The first 100 participants will receive a $5 Starbucks gift card. Click here.

Goodies from the Subnets
We've got SharePoint 2010 training for up to three people from Webucator up for grabs. There's an iPad available, too. Enter to win one!

SLIDESHOWS

Microsoft Windows after 25 years: A visual history
More than nine out of 10 computers run some version of Windows. But no one could have predicted that would be the case when Windows 1.0 launched 25 years ago as a graphical front end for MS-DOS. Here's a look at Windows through the years and some thoughts on what the future might hold.

Cool Yule favorites: 15 techie gifts we like
Ho Ho Ho, it's time again to get our holiday wish lists together. Here are our 15 favorite products from the 140+ products submitted and tested in this year's Cool Yule Tools holiday gift guide.

MOST-READ STORIES

  1. Airports can legally opt-out, kick TSA program to the curb
  2. Twitter generation failed The Science Guy? Nonsense.
  3. Is free DNS a good deal for business?
  4. Google Chrome tops 'Dirty Dozen' vulnerable apps list
  5. 10 free Microsoft products for IT and home users
  6. Report sounds alarm on China's rerouting of U.S. Internet traffic
  7. H-1B at 20: How the 'tech worker visa' is remaking IT
  8. 10 most exaggerated tech terms
  9. Microsoft launches Lync: 70 new devices now, Kinect integration
  10. Microsoft breaks petaflop barrier, loses Top 500 spot to Linux

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: