iPhone, Safari, IE8, Firefox all fall on day one of Pwn2Own | US in search of Apple, cell phone forensic tools as online crime morphs | ||||||||||
Network World Security | ||||||||||
Conficker may be quiet now but it's still a threat WHITE PAPER: Websense Websense Security Labs State of Internet Security 2H09 Do you know just how adept Web adversaries have become in using the Internet to spread malware in their attacks? Understand where the true threats lie with this report which summarizes the significant findings of Websense researchers using the ThreatSeeker Network during the six-month period ending December 2009. Learn More In this Issue
WHITE PAPER: Polycom Top Five Benefits of Video Conferencing From obvious benefits, like reduced travel costs, to a few less apparent advantages, see what Polycom customers, resellers and industry analysts are saying about the power of video conferencing. Read More iPhone, Safari, IE8, Firefox all fall on day one of Pwn2Own US in search of Apple, cell phone forensic tools as online crime morphs Researchers sound alarm on Web app "side channel" data leaks WHITE PAPER: Cisco Systems Inc. Peace Corp: Creating a worldwide unified network Learn how the Peace Corp made its unified network a reality after selecting and deploying cost-effective WAN optimization gear. One of the key factors was selecting a platform that integrated with its existing network spanning 70 countries. The result is dramatically improved performance and significant cost savings. Learn More Malware attack uses China World Expo guise GoDaddy to China: No More Domains for You Hacker busts IE8 on Windows 7 in 2 minutes E-GUIDE: HP ProCurve Standards to Soothe Networking Headaches Is you network comprised of multiple switching tiers running proprietary protocols capable of handling next-generation applications? This Network World eBook looks at open, virtual switching, unified fabrics and bandwidth of 10 Gigabit Ethernet and more. Get expert advice on how to turn your network into a more simplified, open infrastructure. Read Now. Police, security officials meet on cybercrime strategies A CSO's guide to getting to "Yes" Free app makes paid web scanners dead in the water Using social networks to establish a publicly verifiable level of trust
| ||||||||||
Join us on LinkedIn Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today! The Future of Big Iron Today from the Subnet communities Massive giveaway from Cisco Subnet: 50 copies of the Cisco Press CCNP Cert Kits kits are up for grabs. Deadline March 31. NEW! 15 books on Microsoft System Center Operations Manager (OpsMgr) 2007 R2 available, too. SLIDESHOWS 21 apps Apple doesn't want on your 3.0 iPhone 10 geeky items you're embarrassed to admit you want MOST-READ STORIES
| ||||||||||
Do You Tweet? You are currently subscribed to networkworld_security_alert as security.world@gmail.com. Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy To contact Network World, please send an e-mail to customer_service@nww.com. Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701 ** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. ** |
Everything related to Computer Security - Security Audits, Security Vulnerabilities, Intrusion Detection, Incident Handling, Forensics and Investigation, Information Security Policies, and a whole lot more.
Search This Blog
Friday, March 26, 2010
Conficker may be quiet now but it's still a threat
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment