Friday, November 11, 2011

Microsoft patch snuffs out major worm potential

Banks fending off brazen hacker raids on business accounts | A brief history of computer displays

Network World Compliance

Forward this to a Friend >>>


Microsoft patch snuffs out major worm potential
Microsoft issued its four expected patches as part of its regular release cycle, including a fix for a potentially serious worm. Read More


WHITE PAPER: Citrix

Best Practices for Implementing 2048-bit SSL
Ready for 2048-bit SSL? Not with F5. Shift to Citrix NetScaler. 2x faster 2048-bit SSL performance. Download the Citrix and Verisign 2048-bit Performance Kit. Learn more

WHITE PAPER: Dell and Intel

Consolidation to Cloud Foundation
With virtualization comes a simple, automated infrastructure that leads to a dynamic, efficient enterprise. Read this whitepaper to learn how virtualization has proven itself an invaluable technology setting enterprises on the path to cloud computing. Read now.

Banks fending off brazen hacker raids on business accounts
Banks are having to fend off ever more attacks from hackers who break into computers of their business customers and try to make fraudulent funds transfers electronically for large amounts. If you doubt how bad this hacker scourge has become, ask Jorge Solis, senior vice president of security at First Midwest Bank. Read More

A brief history of computer displays
From blinking lights and punch cards to LCDs and 3D flat panels, we trace the 70-year history of the tech that users rely on to see what a computer is doing. Read More

Hire a vet? IT says yes
When President Obama challenged the private sector this past August to hire 100,000 unemployed veterans by the end of 2013, he shared the stage with companies that have some of the largest IT workforces in the United States -- among them Hewlett-Packard, AT&T, Siemens, Honeywell, Accenture and Microsoft. Read More

Secret Snoop Conference for Gov't Spying: Go Stealth, Hit a Hundred Thousand Targets
Forget passive monitoring for government spying; go stealth to hit your target says the Hacking Team which sells hacking techniques and tools for invasive surveillance of the masses. Better yet, hit a hundred thousand targets. We looked at legal means, with a Trojan horse warrant for remote computer searches. But what about those areas of mass surveillance without a warrant that seem shaded grey and... Read More


WHITE PAPER: McAfee

The Case for a New Data-centric DLP White Paper
With increasing data growth, comes increased need for data security. The existing DLP model, with a focus on compliance/enforcement is not sufficient as the data discovery and classification capabilities are not granular enough. Learn More

DARPA to detail program that radically alters security authentication techniques
Researchers from the Defense Advanced Research Projects Agency will next week detail a new program it hopes will develop technology to dramatically change computer system security authorization. Read More

Clouds of anxiety: Companies worry about security of cloud computing
While organizations continue to embrace cloud-computing platforms, surveys find organizations are concerned about security and their very ability to manage it in the cloud. Read More

Gartner: Security services spending to hit $49B in 2015
Gartner is predicting that corporate spending across the world for a broad swath of security services will climb from about $35 billion today to $49 billion in three years, with the managed security services expected to jump most of all. Read More

Feds lead biggest botnet takedown ever, end massive clickjack fraud
The botnet takedown announced Wednesday by the U.S. Department of Justice was the biggest in history, according to a security company. Read More


WHITE PAPER: Trend Micro

Protect Virtual Desktops
Protecting virtual servers, virtual desktops and data stored in the cloud requires security optimized for the unique characteristics of these environments. See Tolly Enteprises' Independent performance tests comparing the performance of Trend Micro, McAfee, and Symantec. Read Now

IT must prepare for Hadoop security issues
Corporate IT executives need to pay attention to numerous potential security issues before using Hadoop to aggregate data from multiple, disparate sources, analysts and IT executives said at the Hadoop World conference here this week. Read More

Wi-Fi security do's and don'ts
Wi-Fi is inherently susceptible to hacking and eavesdropping, but it can be secure if you use the right security measures. Unfortunately, the Web is full of outdated advice and myths. But here are some do's and don'ts of Wi-Fi security, addressing some of these myths. Read More

Apple bans researcher for exploit exposing iOS security flaw
Apple has banned well-known security researcher Charlie Miller from its developer program, for creating an apparently benign iOS app that was actually designed to exploit a security flaw he had uncovered in the firmware. Read More

How your signature can propel your security career
The hood pegged open, showing off a masterpiece of an engine, a small crowd gathered as the sense of anticipation built in the air. People smiled, tapped the person next to them and pointed. Few words were spoken, as if no one wanted to miss what was about to happen. Read More

DARPA gets serious with Internet security, schmoozes the dark side
The Defense Advanced Research Projects Agency (DARPA) had a big hand in creating the Internet and now its wants to get serious about protecting it. Read More



SLIDESHOWS

Wi-Fi security do's and don'ts
Wi-Fi is inherently susceptible to hacking and eavesdropping, but it can be secure if you use the right security measures. Unfortunately, the Web is full of outdated advice and myths. But here are some do's and don'ts of Wi-Fi security, addressing some of these myths.

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. FBI takes out $14 million DNS malware operation
  2. Fabric wars: Cisco vs. Brocade vs. Juniper
  3. Adobe's decision to ditch mobile Flash: What you need to know
  4. Gartner: The top 10 strategic technology trends of 2012
  5. Juniper at the root of Internet outage?
  6. Meme-mania: The Musical, plus this week's other geekiest videos
  7. Microsoft isn't Apple: Redmond OKs Windows Phone 7 jailbreak tool
  8. Comcast begins rollout of IPv6 production network
  9. Microsoft patch snuffs out major worm potential
  10. iPhone apps: DIY skill that's in big demand

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: