Search This Blog

Thursday, August 13, 2009

Hiring hackers; Apple patches 6 Safari security vulnerabilities

Apple patches 6 Safari security vulnerabilities; Microsoft fixes 19 bugs in big patch smorgasbord
Network World logo

Security Strategies Alert

NetworkWorld.com | Update Your Profile


Sponsored by WatchGuard
rule

Stop the 10 most common network attacks
Learn how to counter the 10 most common vectors of data compromise that small to medium sized businesses face. Download this white paper now to get a no nonsense perspective and practical techniques and defenses to counter threats and make your business more secure. Download Now.

rule

Spotlight Story
Hiring hackers (part 1)

The British government announced at the end of July that it was planning to recruit "clever young people" to fight the cyberwars against domestic and especially foreign cyberoperatives. Read full story

Related News:

Apple patches 6 Safari security vulnerabilities
A month after it last patched Safari, Apple today plugged six security holes, four of them critical, in both the Mac and Windows versions of its Web browser.

Microsoft fixes 19 bugs in big patch smorgasbord
Microsoft today delivered nine security updates that patched 19 vulnerabilities in several crucial components of Windows, as well as in Media Player, Outlook Express, IIS, Office and several other products.

Study: Air Cargo Security Seriously Lacking
There are serious security problems in international air cargo transportation and the controls around it, according to a report released this week by the International Transfer Center for Logistics and the Technische Universität of Berlin (See also: What New Air Cargo Security Rules Mean for Business).

Cloud computing, compliance raise questions
I'll continue today with some miscellaneous notes, announcements and conversations that happened in the run up to the recent Catalyst Conference that I started in the last issue.

Free Web antimalware tool offered up
Free stuff has been a vendor mainstay to build a customer base, and start-up Dasient is trying that with a lightweight version of its open source technology for detecting and fixing Web pages compromised with malware.

August Giveaways
Cisco Subnet is giving away training from Global Knowledge and 15 copies of Practical Intrusion Analysis; Microsoft Subnet is giving away training from Global Knowledge and 15 copies of SCCM 2007 Unleashed. Google Subnet is giving away 15 copies of Web Geek's Guide to Google Chrome. Entry forms can be found on the Cisco Subnet, Microsoft Subnet and Google Subnet home pages. Deadline for entries is August 31.

Network World on Twitter? You bet we are


Cool BlackBerry games
Black HatBlackBerries are known for e-mail, but they are also getting better at mobile games. Here are 10 of the best.

Google facts
IT quizTake this quiz to see how well you know the company – and no fair googling the answers.

Gaining the Performance Edge Using a Column-Oriented Database Management System
Many organizations are increasingly recognizing the potential benefits of how analytic databases can support reporting, strategic analysis, and other business intelligence activities. Explore the data explosion phenomenon and why column-oriented database systems are able to provide the boost that is needed to gain the performance edge.
Gaining the Performance Edge Using a Column-Oriented Database Management System


IDC: Realizing the Benefits of Deduplication
Many organizations are grappling with rapidly growing storage requirements. IDC has found that those organizations are experiencing 50% growth in data, adding as much as 4TB of data each year.
IDC: Realizing the Benefits of Deduplication

 

August 13, 2009

TOP STORIES | MOST DUGG STORIES

  1. Should your credit report disqualify you for a job?
  2. Top 10 must-have iPhone business apps
  3. How famous OS logos got started
  4. 10 worst video game systems of all time
  5. Why Microsoft is sabotaging desktop virtualization
  6. Do HP, 3Com value claims trump Cisco?
  7. Who says the router can't be sexy?
  8. Microsoft, Apple, Mozilla patches
  9. Patch Tuesday: What the experts are saying
  10. Windows 7: How low can you go?

Stopping Fraud Before it Impacts your Network
Better protect your corporate assets with a solution that integrates with existing security devices and adds comprehensive analysis including: Correlation, anomaly detection and pattern discover. Discover the benefits of using holistic reporting, visual analytics and incident response tools.
Learn More



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: