Friday, May 17, 2013

Facebook attacked with credential-harvesting malware

  7 steps to securing Java | SunGard brings cloud service to disaster recovery
 
  Network World Compliance

Forward this to a Friend >>>


Facebook attacked with credential-harvesting malware
Dorkbot variant infection unusual because the criminals exploited a flaw in the file-sharing site MediaFire to spread the malware Read More


RESOURCE COMPLIMENTS OF: Cisco

The Cisco Unified Workspace
Trends such as mobility, virtualization, video, collaboration, knowledge management, and cloud have come to the forefront as companies struggle with how to integrate iPads, tablets, and smartphones into their business and IT models. In response, the Cisco Unified Workspace provides a solution for creating an organization-wide mobility strategy. Learn More.

WHITE PAPER: Salesforce.com

The Science of Social Listening for Customer Experience
Customers today expect immediate service and fast resolutions from the social Web. These conversations are happening right now, on millions of sites, among millions of people. Are you listening? Learn how your business can transform the customer service experience into a more social one. Learn More!

INSIDER
7 steps to securing Java
Java, the popular OS-independent platform and programming language, runs on just about every kind of electronic device imaginable, including computers, cell phones, printers, TVs, DVDs, home security systems, automated teller machines, navigation systems, games and medical devices. Read More

SunGard brings cloud service to disaster recovery
Can the old guard in business continuity and disaster-recovery services thrive in an era when the companies are looking at new ways to process business data? SunGard Data Systems, with decades of experience in availability services, is feeling the pinch as some business clientele move data to the cloud. But SunGard says it's pushing forward with innovations that are making it a public cloud provider as well with the kind of application availability it says will be hard to match elsewhere. Read More

View from inside Verizon's security SWAT team
Bryan Sartin is director of Verizon's RISK Team, the communications provider's computer forensics practice, which is also the group that helps create the annual Data Breach Investigations Report (DBIR). Network World Editor in Chief John Dix caught up with Sartin to learn more about the RISK Team, get his take on the state of enterprise security, and discuss new findings from the recently published DBIR report.
 Read More

10 more of the world's coolest data centers
From a repurposed chapel to inflatable modules, data centers don't fit the same mold Read More


WHITE PAPER: Tripwire

Five Tips for Outsmarting the Information Age Adversary
Today's attackers vigilantly wait for you to slip up before they strike your information systems and compromise your data. Learn five actions you can take to improve your information risk management and security strategy and stay one step ahead of the information age adversary. Read More

Online gaming company recounts fighting for survival vs. DDoS attacks
Fighting denial-of-service attacks has become a matter of survival for some businesses that find their websites getting smashed and network flooded by attackers. Online gaming company SG Interactive says it's under constant attack and the only way to keep going is to set up an anti-DDoS defense. Read More

Intel's McAfee brings biometric authentication to cloud storage
Intel is introducing new ideas to secure the public cloud, offering a service in which online files can be accessed after users are verified by an authentication scheme including face and voice recognition. Read More

Health care breach victims plummet
Tougher rules and big settlements are said to be behind the fall in affected clients, but one group calls it the 'calm before the storm' Read More

Labor Department hackers more sophisticated than most
Security pro says attacks designed for further breaches, noting, 'They're not gathering this information and sending it home for no reason' Read More


WHITE PAPER: IBM Corporation

IBV Study: the Business of Social Business
The IBM Institute for Business Value produced this executive report. Learn how social business has a significant impact on the way organizations create valuable customer experiences and accelerate innovation across the entire organization. Learn More

Federal requirement for open access: Seeing what you paid for
In early May President Obama signed an executive order that makes "Open and Machine Readable the New Default for Government Information". Read More

FBI briefs US bank executives on wave of cyberattacks
The FBI has reportedly briefed US bank executives on a wave of cyberattacks that have lashed the industry since last summer as part of a new policy designed to foster co-operation between the state and private sectors. Read More

Google's five-year plan for authentication: It's complicated
Google has released a draft of its next five-year plan for login authentication that tries to stay at least on par with criminal hackers, but recognizes that strong security requires industry collaboration. Read More

She's gonna blow! Ten Star Trek technologies that are almost here
Warp drives, teleporters, helpful holograms -- the new frontier is a lot closer than you might think Read More

 
 
 

SLIDESHOWS

Sun's stars: Where are they now?

One of the brightest lights in Silicon Valley for more than two decades.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 10 amazing Linux desktop environments you've probably never seen

2. Is Microsoft power-snooping on Skype conversations?

3. Google CEO on innovation: 'We're at 1% of what's possible'

10. How to keep the feds from snooping on your cloud data

8. Why aren't Microsoft's competitors joining in on the Windows 8 jokes?

9. Google rolls out by-the-minute cloud billing, introduces a new NoSQL database

7. Google rolls out by-the-minute cloud billing, introduces a new NoSQL database

6. 10 things BlackBerry Z10 does that iPhone can't

5. 5 free remote desktop apps for Windows 8

4. Google tells Microsoft to shut down its YouTube app for Windows Phone

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

1 comment:

  1. Anonymous9:13 PM

    fantastic publish, very informative. I'm wondering why the other experts of this sector don't understand
    this. You must proceed your writing. I'm confident, you've a
    huge readers' base already!
    facebook for business

    ReplyDelete