Search This Blog

Tuesday, September 01, 2009

Apple: Exploding iPhones Not Our Fault; Apple Snow Leopard malware defense ‘very basic,’ security vendor says

New cloud infrastructure service focuses on security; Apple Snow Leopard malware defense 'very basic,' security vendor says
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile


Sponsored by TippingPoint
rule

Identity Management E Guide
Identity management cannot be ignored – it is the key to preventing data breaches. This Network World Executive Guide provides in-depth information on today's most pressing security issues.

Read More

rule

Spotlight Story
Is an IPS necessary?

A reader asks: Do we need an IPS? Ron Nutter answers. Read full story

Related News:

New cloud infrastructure service focuses on security
OpSource on Friday announced a new cloud computing infrastructure service that it says meets the security and management needs of enterprises more effectively than rival offerings.

Apple Snow Leopard malware defense 'very basic,' security vendor says
The XProtect anti-malware feature included the new Apple Snow Leopard operating system defends against just two Trojans, says one security vendor.

Apple: Exploding iPhones Not Our Fault
Apple says it's not to blame for a series of exploding iPods and iPhones, according to a report published on Friday. The company has been under fire, so to speak, for devices overheating and shattering across Europe and the U.K.

Developer denies software to beat Chinese censors is malicious
UltraSurf is free software designed to promote unrestricted Internet access for citizens of China.

Crossing Borders with Laptops: Facts and Tips
Earlier this week, the U.S. Department of Homeland Security made it clear that border crossing officials could continue to search any device that can store electronic media without any suspicion of wrongdoing.

AJAX widget security enabled
In an upgrade to one of its core technologies, the OpenAjax Alliance, an industry group formed to boost interoperability in the AJAX space, on Monday is offering OpenAjax Hub 2.0, featuring capabilities for secure interaction between JavaScript widgets.

Companies put security on back burner in dash to virtualise
Companies are putting security on the back burner in the rush to virtualise their data centres. That's according to applications delivery vendor F5 which conducted a survey of more than 100 decision makers about their virtualisation plans.

Microsoft Subnet is giving away training from New Horizons and 15 copies of Windows Server 2008 How-To. Cisco Subnet is giving away 15 copies of Interconnecting Data Centers Using VPLS. Google Subnet is hosting many new bloggers (watch for giveaway information soon.) Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


10 sports technologies to love, 5 to hate
Sports technologiesMany technologies help fans enjoy sports. Others just annoy.

Apple disasters
Apple disastersApple has enjoyed huge success with the iPod and iPhone, but Apple has had a number of commercial flops, too.

IDC: Optimizing Storage to Reduce Data Footprint and Lower Costs
Read this review on today's storage optimization and technologies. Learn how they reduce the data footprint and identify how various technologies work toward this goal.
Learn more


Sophos Security Solution Center
With the threat landscape constantly changing, you need to have comprehensive protection that isn't complicated. With Sophos, you get complete protection for less investment. You get best-in-class threat protection, and data security and compliance that are simple and affordable so you can get more out of your existing security budget. Review timely resources at this Solution Center.
Visit this site today!

 

September 01, 2009

TOP STORIES | MOST DUGG STORIES

  1. Wi-Fi encryption cracked in 60 seconds
  2. Developer denies software to beat Chinese censors is malicious
  3. 12 words you can never say in the office
  4. FBI investigating laptops sent to U.S. governors
  5. China game boss sniped rivals, took down Internet
  6. The opposite of Twitter
  7. 12 cool ways to donate your PC's spare processing power
  8. Proposed bill gives Obama power to shut down Internet
  9. Group offers tools to evade China's Web censorship
  10. 5 techs that could reinvent cell phones

Closing the Risk Gap in Privileged Access Control
In this whitepaper, Enterprise Management Associates (EMA) examines this critical issue in IT security administration in light of the Symark approach to helping businesses move from a trust-based system to a secure, auditable process in order to provide a higher standard of control and better support for regulatory compliance.
Learn More



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: