Friday, May 27, 2011

5 ways to stay safe from fake anti-virus malware attack on Macintosh

Insider data theft costs Bank of America $10 million | Google Wallet: Five things you need to know

Network World Compliance

Forward this to a Friend >>>


5 ways to stay safe from fake anti-virus malware attack on Macintosh
Macintosh users are finding out the hard way what Microsoft Windows users have known for a long time: Criminals want to sell them fake anti-virus software by scaring them with lies that their computer is infected. Read More


WHITE PAPER: F5 Networks

Magic Quadrant for Application Delivery Controllers, 2010
The market for ADCs is consolidating. However, innovation continues, especially among some select smaller players. Although there are clear leaders in the ADC market, enterprises should focus their buying decisions on a vendor's ability to support specific application requirements. Learn more!

WHITE PAPER: Dell

Converged Communications: People and Applications in Synch
Most small and midsize organizations find implementing unified communications a daunting task, between lack of in-house expertise and complex integration issues, it's easy to back burner this project. Find out how to implement a communications strategy in this Collaboration KnowledgeVault. Learn more

Insider data theft costs Bank of America $10 million
A Bank of America insider who sold customer data to criminals cost the bank at least US$10 million in losses. Read More

Google Wallet: Five things you need to know
Now that Google has officially released its Google Wallet mobile payment platform, here are five things you need to know about it. Read More

Oklahoma City using SIEM to crack down on hackers - and wayward employees
Oklahoma City is using technology that not only watches for signs of any hacker activity on its municipal government network, but monitors employee online behavior to assure no one's going out of bounds. Read More


WHITE PAPER: PC Mall

The Important Role of Storage for Success in Server
This white paper describes the advantages of scale-out iSCSI storage in four areas—cost, high availability and disaster recovery, performance, and management—and illustrates how SANs provide better overall support for virtualized environments. Read now!

Researchers crack Microsoft, eBay, Yahoo, Digg audio captchas
Researchers have figured out how to to crack captchas, making it possible to launch automated attacks against sites such as Microsoft, eBay and Digg where opening phony accounts could be turned into cash. Read More

Hackers steal Hotmail messages thanks to Web flaw
Criminals recently spent more than a week siphoning e-mail messages from Hotmail users' accounts, thanks to a programming bug in Microsoft's website. Read More

Aggressive spammers set up their own URL-shortening sites
Spammers are experimenting with a new tactic to improve their success rate: setting up their own URL-shortening sites as a way to dodge anti-spam software and avoid protections put in place by legitimate URL-shortening sites. Read More


WHITE PAPER: F5 Networks

Load Balancing 101: Firewall Sandwiches
How to make a ''firewall sandwich''. Read now. Learn More!

Check Point's new security blades cut both ways
If you're in the market for endpoint protection, Check Point's new R80 Unified Endpoint Security Management product shows promise. Read More

U.S. international cyberspace policy sounds good; will be hard to implement
The ambitious new U.S. strategy for securing the Internet sets critical goals that may be hard to put into practice, experts say, because some of them conflict and pose seemingly insurmountable technical problems. Read More

PlayStation Network hack will cost Sony $170M
Sony expects the hack of the PlayStation Network and will cost it ¥14 billion (US$170 million) this financial year, it said Monday. Read More

Siemens' 'damage control' response to SCADA bug frustrates researcher
Siemens said it intends to fix a vulnerability discovered in its industrial control system products, but the NSS Labs researcher who found the bug says the company seems to be downplaying the seriousness of the problem to save face. Read More

It's the human threat, stupid
Eric O'Neill, the former FBI operative who played a crucial role in the arrest and conviction of FBI agent Robert Hanssen for spying against the U.S. for the former Soviet Union and Russia, says security can't rely on tech alone. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from Cisco Subnet: 15 copies of IPv6 for Enterprise Networks. Enter here.

SLIDESHOWS

7 things we love about Drupal 7
Drupal. the open source Content Management System (CMS) used to power everything from personal sites to the White House's Web site, is legendary for its flexibility and power. Here are the best things about it.

MOST-READ STORIES

  1. Windows 1.0: Still playing Reversi after all these years
  2. Cisco sued over its alleged part in scandal
  3. Insider data theft costs Bank of America $10 million
  4. 5 questions to ask before buying Microsoft licenses
  5. Microsoft offers students a free Xbox with new Windows 7 PCs
  6. Cisco is a top 3 server vendor
  7. Cisco adds IPv6 migration features to routers
  8. Aggressive spammers set up their own URL-shortening sites
  9. How to stay safe from fake anti-virus malware attack on Macs
  10. Sony, LG challenge Motorola for Verizon users' hearts, cash

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: