Friday, May 20, 2011

Six rising threats from cybercriminals

So you think you know networking? | VMware seeks security 'manager of managers' role for vShield

Network World Compliance

Forward this to a Friend >>>


Six rising threats from cybercriminals
Hackers never sleep, it seems. Just when you think you've battened down the hatches and fully protected yourself or your business from electronic security risks, along comes a new exploit to keep you up at night. It might be an SMS text message with a malevolent payload or a stalker who dogs your every step online. Or maybe it's an emerging technology like in-car Wi-Fi that suddenly creates a whole new attack vector. Read More


WHITE PAPER: Qwest

Manage Complexity, Cost and Compliance
To outsource or not to outsource IT security—that is the question for enterprises as they face increasingly complex cyber threats. Managed security services can help organizations alleviate the cost and complexity of proactively securing the IT infrastructure. Read Now.

WEBCAST: HP & Intel

New Economics for HPUX computing
The UNIX economies have changes and with industry changing Converged Infrastructure, HP has made it even easier to take applications into that world. Learn more

So you think you know networking?
Here's a brief quiz to test knowledge of some well known, some obscure networking terms and events. Read More

VMware seeks security 'manager of managers' role for vShield
With the popularity of its virtual-machine software soaring, VMware has been focusing on optimizing security for its vSphere platform both through cooperation with third-party security vendors and encouraging a shift to its own software-based security architecture known as vShield. Read More

Symantec to acquire Clearwell for e-discovery
Symantec today announced it has entered into an agreement to acquire privately held Clearwell Systems for about $390 million, a move that will put Symantec in the e-discovery market. Read More

Siemens industrial-control security vulnerability could be disclosed today
Although a public talk about new vulnerabilities found in Siemens industrial control systems (ICS) was pulled yesterday from a conference agenda due to its sensitive nature, the head of the vulnerability-test group that discovered the security holes said it expects Siemens will soon have a fix and will be discussing it. Read More


WHITE PAPER: Aerohive

SLA Compliance: Wireless Fidelity Achieved
Aerohive delivers the next level in network visibility and reactive response with a new infrastructure-side performance monitoring and response system: SLA Compliance. Read now!

Microsoft: One in 14 downloads is malicious
The next time a website says to download new software to view a movie or fix a problem, think twice. There's a pretty good chance that the program is malicious. Read More

Mac App Store's slow updates expose users to security risks
Apple's Mac App Store puts users at risk because it's slow to update vulnerable software, a security researcher said Wednesday. Read More

About a month later and Sony's PlayStation Network still isn't fully restored
It will be a month tomorrow since Sony's PlayStation Network was fully operational, and the popular gaming site is still beset by troubles. Read More

Personal data of Massachusetts' unemployed stolen
As if being unemployed isn't bad enough, 210,000 unemployed residents of Massachusetts may have had personal data about them stolen from the state agency that is supposed to be helping them out. Read More


WHITE PAPER: Aerohive

SLA Compliance: Wireless Fidelity Achieved
Aerohive delivers the next level in network visibility and reactive response with a new infrastructure-side performance monitoring and response system: SLA Compliance. Read now!

Google moves fast to plug Android Wi-Fi data leaks
Google today confirmed that it's starting to roll out a server-side patch for a security vulnerability in most Android phones that could let hackers snatch important credentials at public Wi-Fi hotspots. Read More

Researcher: Dropbox misrepresents security features
Cloud data storage and synchronization company Dropbox has been hit with a complaint to the U.S. Federal Trade Commission alleging that the company has deceived consumers about the level of encryption security it offers. Read More

Facebook fights California privacy push
California is considering legislation that would tighten Facebook's privacy practices, and the social network is not happy about it. Read More

Securing Google Apps: A CIO Q&A
Boston-based Bay Cove Human Services is a non-profit organization that offers assistance and service to 4,000 people and families in Massachusetts. CIO Hilary Croach has several technology challenges to contend with. For starters, the agency has its hands in a number of service areas, including helping individuals with developmental disabilities, mental illness, drug and alcohol addiction, and those who need support with aging. With about 140 locations around Eastern Massachusetts, Bay Cove's employees and IT operations are scattered. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from Cisco Subnet: 15 copies of IPv6 for Enterprise Networks. Enter here.

SLIDESHOWS

A quick guide to '4G' phones
We've created this handy guide to 4G smartphones – all of which are based on the Android operating system right now – to help you look past the marketing rhetoric and learn what to really expect from these phones.

MOST-READ STORIES

  1. Microsoft: One in 14 downloads is malicious
  2. Cisco to dump Linksys, WebEx?
  3. Gov't: We want stored emails, phone locations. New bill: Get a warrant!
  4. Microsoft's cloud licensing changes: what you need to know
  5. To 2011 grads: Go to the bathroom, don't be a jerk and take risks
  6. TinKode hacked NASA's Goodard Space Flight Center
  7. Cisco looks to reboot its business model
  8. Almost all Android phones vulnerable to authentication attack
  9. The coming battle between Android and Windows Phone 7
  10. The 11 most influential online worlds of all time

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment