Search This Blog

Friday, January 29, 2010

NSF earmarks $30M for game-changing Internet research

Will Cloud Computing Kill Privacy? | DDoS attacks, network hacks rampant in oil and gas industry, other infrastructure sectors

Network World Security Alert

Forward this to a Friend >>>


NSF earmarks $30M for game-changing Internet research
So you want to build a better Internet? The National Science Foundation today said it would spread $30 million over 2-4 projects that radically transform the "Net through new security, reliability and collaborative applications.  Read More


WHITE PAPER: WatchGuard

Avoid Compliance Violations
Protecting confidential data is serious business. Failure may result in fat fines and even jail time - not to mention damage to your brand. WatchGuard's easy-to-use, all-inclusive email and web secure content and threat prevention appliances offer a complete data protection solution. Click here.

WHITE PAPER: Force10

Three Steps to Saving with Cloud Computing
Discover how cloud computing dynamically streamlines your infrastructure, delivering freely scalable application service levels; dramatic capital and operational cost savings; flexibility and agility without new hardware; and more. Read Now!

Will Cloud Computing Kill Privacy?
As cloud computing speeds ahead, privacy protections are too often being left in the dust. Read More

DDoS attacks, network hacks rampant in oil and gas industry, other infrastructure sectors
Massive denial-of-service attacks and infiltration of corporate networks by attackers is a common experience for companies in critical infrastructure sectors, including financial services, energy, water, transportation and telecom. Read More


WHITE PAPER: Radware

Rethinking Application Security
Hacker motivation has changed from gaining fame to financial gain. Cyber crime activities now employ a new level of network attacks, which go undetected by standard network-security tools. This paper discusses the changing threat landscape and how you can protect your business from emerging threats. Read More

Bugs and Fixes: Adobe Reader, Acrobat Come Under Fire
Adobe product security took another hit recently when reports surfaced of a zero-day attack against a critical vulnerability in the ubiquitous Adobe Reader. Read More

Leading voice encryption programs hacked in minutes
Most voice encryption systems can be tapped in minutes by installing a voice-recording Trojan on the target computer, a security researcher has confirmed after testing a range of well-known products. Read More


WHITE PAPER: Trend Micro

Effectively Deal with Security Threats in Real-Time
Eliminate costly and time-consuming manual security processes with a network security overwatch layer. Raise the bar on security protection within your organization. Find out why an overwatch layer should be part of your best practice security requirements. Read now.

Malware Aims to Evade Windows 7 Safeguards
Experts agree that Windows 7 has enhanced security to ward off attacks on vulnerabilities in old software. But what if a money-minded online scammer can persuade you to download malware onto your PC? Read More

When standards bodies are the cyber threat
Believe it or not, some practices of the groups charged with producing security standards represent cyber threats in their own right. As government and industry increasingly collaborate to enhance cyber security, it is critical these practices be considered as part of the overall cyber security framework. Read More

Facebook tool could be exploited by cyber-bullies
A recent Facebook feature can be exploited to be a cyber-bullying tool in the wrong hands, a security vendor warns. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

New giveaways! Win a year's worth of 24/7 video training from ClipTraining. Win books on WS2008 R2, Cisco WAAS and the CCIE. Deadline Jan. 31. Plus: On Cisco Subnet: Are two routers enough to study for the CCNA? On Microsoft Subnet: AxCrypt: Open Source tool for encrypting files; On Google Subnet Google's reports blockbuster Q4, modest FY09.

SLIDESHOWS

12 years of big-time Apple innovations
From the iMac to the iPad, here are the biggest releases of the second Steve Jobs era.

10 Gigabit data center switch shootout
We tested six top-of-rack data center switches 10 ways to Sunday.

MOST-READ STORIES

  1. IBM, researchers to develop controversial lithium air battery
  2. Did Apple's iPad debut put a choke-hold on the Internet?
  3. Facebook and Twitter? Why not just put a gun to your head?
  4. Apple's iPad: can it rise to enterprise IT demands?
  5. FCC probes Google, T-Mobile for termination fees
  6. Free software embraced by CIOs
  7. 12 years of big-time Apple innovations
  8. Cisco announces changes to CCNP
  9. The Apple iPad specifications: three models starting at $499
  10. The networks of iPad

Network World on Twitter? You bet we are

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Update your profile | Terms of Service/Privacy

Copyright Network World, Inc., 2010

Network World, Inc.,, 492 Old Connecticut Path, Framingham, MA 01701


No comments: