Friday, October 12, 2012

Getting forensics data off smartphones, tablets can be tough, experts say

  The 9 most endangered IT career paths | Seven BYOD policy essentials
 
  Network World Compliance

Forward this to a Friend >>>


Getting forensics data off smartphones, tablets can be tough, experts say
Trying to get computer forensics data out of mobile smartphones and tablets in order to conduct investigations is hard -- often much harder than on PCs, laptops or Macs -- and experts say that forensics tools need to improve. Read More


WHITE PAPER: AccelOps

Enabling Data Center and Cloud Service Management
Read this white paper to learn how the combination of discovery, data aggregation, correlation, out-of-the-box analytics, data management, and reporting can yield a single pane of glass into data center and IT operations and services. Learn more.

WHITE PAPER: Good Technology

Fuel Mobile Collaboration. Secure Data & Privacy.
Read this whitepaper to learn how to enable mobile collaboration while maintaining data security and strict end user privacy whether on BYOD or a mix of corporate and employee owned devices. Read Now!

The 9 most endangered IT career paths
The IT job landscape is evolving quickly. Here's how to avoid IT extinction Read More

INSIDER
Seven BYOD policy essentials
Like it or not, the "bring your own device" (BYOD) trend is in full swing. According to Juniper Research, the number of employee-owned smartphones and tablets used in businesses will more than double by 2014, reaching 350 million compared with almost 150 million this year. Read More

Spear-phishers lie in wait at 'watering hole' websites
Targeted spear-phishing attacks are going after not just individuals but entire websites that function as "watering holes" for groups of people with focused interests, according to security company Websense. Read More

Poisoned links plague Microsoft's Bing search
Microsoft's Bing is the king of poisoned search engine links. Or, perhaps it isn't. Read More


RESOURCE COMPLIMENTS OF: LogMeIn

LogMeIn Rescue: Remote Support for PCs and mobile devices.
Rescue lets you remotely connect, troubleshoot and repair PCs and todays' most popular smartphones. With Rescue, IT can instantly connect, diagnose and solve. This enables IT to do more, and spend time on the tough IT cases. Do more and improve customer satisfaction and outcomes. Find out what IT knows. Do More. Try Rescue today

U.S. banks warned of another attack threat
Just as one type of attack against U.S. banks has subsided, the banks are being warned to get ready for another, called "Project Blitzkrieg," aimed at online theft. Read More

A better reason not to use Huawei routers: Code from the '90s
Security researcher Felix "FX" Lindner has a more compelling reason to steer clear of routers from Huawei Technologies than fears about its ownership. Read More

New security threat at work: Bring-your-own-network
Employees who access corporate networks and download data onto their mobile devices may not be as much of a security risk as those who bring consumer hotspots into the corporate environment. Read More

Hackers steal thousands of student records from computers at Florida college
An information breach at a Florida college has compromised information of about 279,000 students and employees, the Florida Department of Education said on Wednesday. Read More


WHITE PAPER: Citrix Systems

Consolidation Without Compromise
Pay more to get less consolidation? The Iron Age is over. Shift to Citrix NetScaler. 2x consolidation. For less. Get Consolidation Without Compromise now. Learn More

Microsoft move hints at the death of Windows service packs
Microsoft's first-time move Tuesday to update Windows 8 before the OS launches is a sign of the company's continued edging toward practices long held by rivals Apple and Google. Read More

Conficker worm still being tracked, but evidence collection slows
The notorious malware known as the Conficker worm still infects computers, a sort of wild horse with no rider, but investigators appear no closer to finding its creator. Read More

RSA simple password-protection to stop hackers
RSA, the security division of EMC, today announced a security product intended to protect simple passwords stored within businesses for authentication purposes, by splitting these passwords in two pieces kept separately, in theory making it harder for hackers to get hold of them. Read More

Trend Micro takes aim at targeted attacks with custom-designed security service
Trend Micro has outlined a product-development strategy it calls "Custom Defense" intended to augment traditional signature-based anti-malware defense with custom-designed signatures to thwart stealthy, targeted attacks. Read More

10 PC products that look like science fiction
Read More

 
 
 

SLIDESHOWS

Top 10 cloud jobs
Researchers at Dice.com have crunched the numbers to come up with a list of the top 10 most available jobs in the cloud.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Cisco accuses Huawei of misstating findings of 10-year-old litigation
  2. Apple planning to manufacture 10 million iPad Minis
  3. Microsoft hints at the death of Windows service packs
  4. PC sales down, Windows 8 shares the blame
  5. Legal and technical BYOD pitfalls highlighted at RSA security conference
  6. The 9 most endangered IT career paths
  7. .xxx to launch porn search engine
  8. What are grand technology and scientific changes for the 21st century?
  9. Office for iPad may be exactly what Microsoft wants
  10. Islamic hacktivists target three more U.S. banks
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: