Wednesday, April 28, 2010

Microsoft Update keeps Office secure, says researcher

Linux machines surprisingly linked to spam | Senators call on Facebook to protect user privacy

Network World Security

Forward this to a Friend >>>


Microsoft Update keeps Office secure, says researcher
A Qualys researcher said that Microsoft's optional Update service has helped ensure that more users are keeping their Office applications up to date. Read More


WHITE PAPER: Oracle

Business Agility Strategies For Midsize Organizations
Midsize businesses have enormous IT pressures: building an infrastructure that is flexible, designed to accommodate rapid growth and meets compliance challenges with resources nowhere near larger enterprises. This video whitepaper explains how Oracle is delivering applications specifically for midsize businesses. Learn More

WHITE PAPER: Sophos

Best practices for implementing Windows 7
If you're planning to roll out Windows 7, now is the time to review your endpoint and data protection strategies to make sure that you're taking full advantage of the new security features as well as enhancing your overall security for enterprise deployments. Read Now.

Linux machines surprisingly linked to spam
Although Linux holds only a small market share, Linux computers appear to send a disproportionate amount of spam compared to other operating systems, according to new research from Symantec's MessageLabs messaging security division. Read More

Senators call on Facebook to protect user privacy
Three U.S. senators are attempting to push Facebook to change its privacy policy and better safeguard users' personal information. Read More

NASA expands lab role of International Space Station
NASA is looking for a few good experiments to run in space.  The space agency this week said it was seeking research ideas from private entities to want to do research on board the International Space Station. Read More


WHITE PAPER: Riverbed

Overcome Two Key Challenges with Virtualization
How do you accelerate virtualization for your enterprise - and take IT flexibility and cost savings to the next level? Start by downloading this whitepaper from Riverbed. WAN optimization is a class of technology that has rapidly been adopted across enterprises in order to address the challenges of bandwidth limitations and latency over the WAN. Click here!

Cereal hacker on defacement rampage
The websites of Kellogg's, Nutri-Grain, Vogel's and Specialty Cereals were hit in a string of mass defacements on Sunday. Read More

Businesses 'vastly overconfident' on security
Businesses remain very overconfident about security, according to an extensive study on their practices. Read More

Social Networking Exposes Business Networks to Risk
Once upon a time, instant messaging was a consumer technology. That consumer toy worked its way into the corporate network and was eventually not just accepted, but embraced and leveraged as a valuable tool. Social networking is on that same path, but still has some security growing pains to go through on the way. Read More


WEBCAST: ShoreTel

A Lower Cost Approach to UC
Learn about a switch-based architecture that provides the industry's lowest total cost of ownership while exploiting the full power of IP. See why this system beats the market leaders and has over 1 million users like Big Brothers/Big Sisters who candidly discuss their selection process, goals and ultimate success in moving to UC. Learn More!

Toshiba laptop encryption drive aims at upgraders
Toshiba is going after laptop users looking to retrofit a full disk encryption (FDE) drive to their portables, announcing the new Enigma SED drive. Read More

Canning the spammers: Operators' licenses? For computers??
Can we do anything to fight the waves of unsolicited commercial e-mail (spam) flooding into our electronic mailboxes? In this third of a three-part series, I look at some unusual ideas for improving our defensive posture. Read More

The evil men (can) do with embedded systems
Embedded IT infrastructure is everywhere and full of holes evil-doers can use for world domination. How SecurityFAIL.com could stem the tide. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

15 copies of CompTIA A+ study kits (book, video, flash cards) are available from Cisco Subnet.Deadline April 30. 15 books on Microsoft Systems Center Enterprise suite are available, too.

SLIDESHOWS

12 "White Hat" hackers you should know
These "White Hat" security researchers are ethical hackers whose discoveries and inventions shake things up - as they try to stay one step ahead of their underground "Black Hat" cousins.

Interop history quiz
The venerable networking tradeshow Interop convenes this month in Las Vegas. Answer the following 10 questions about Interop, keep score and see how you stack up at the end.

MOST-READ STORIES

  1. Corporate IT just won't let IE6 die
  2. Breaking down the BlackBerry Pearl 3G, Bold 9650
  3. 40G Ethernet takes center stage at Interop
  4. Wi-Fi 11n competition heats up
  5. Standby for your shot at Halo: Reach pre-beta codes
  6. RIM unveils its first 3G BlackBerry Pearl
  7. Spy tools: What private investigators use to sleuth
  8. Cisco finally releases 64-bit IPSec client
  9. 15 future-laptop concepts: The fascinating and the far-fetched
  10. Conficker found on 25% of enterprise Windows PCs

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment