Search This Blog

Wednesday, June 09, 2010

Microsoft patches IE8's Pwn2Own bug in massive update

Mobile phone security dos and don'ts | What kind of software costs $920 million?

Network World Security

Forward this to a Friend >>>


Microsoft patches IE8's Pwn2Own bug in massive update
Microsoft today patched 34 vulnerabilities in Windows, Office and Internet Explorer (IE), including an IE8 bug used by a Dutch security researcher in March to win $10,000 at the Pwn2Own contest. Read More


WHITE PAPER: Adobe

Close the Web 2.0 Communications Gap
Web 2.0 tools have yet to reach critical mass and broad user adoption. This Forrester report identifies the key Web 2.0 gaps and offers advice to: Build a framework that extends email, Upgrade document-based data collection, and Improve email and document exchange security. Read More

WHITE PAPER: Fluke Networks

Troubleshooting Application Problems
This comprehensive 94 page guide is a how-to resource handbook for network engineers. Learn the fundamentals of how applications work, how they flow, where applications fail and best practices and methodologies for troubleshooting network and application problems. Click here!

Mobile phone security dos and don'ts
Is your enterprise security team struggling to keep up with the rapid proliferation of mobile and smart phones? Five experts offer advice to help you protect everything from the BlackBerry to the iPhone and Droid. Read More

What kind of software costs $920 million?
Some big defense contractors got even bigger this week as the Air Force  awarded a $919,640,000 deal for the development of its critical mission planning software.  Read More

Here's a better idea for securing the nation's electric grid
Last week Ellen Messmer wrote an article recapping NERC's report on many potential paths to destruction of our North American Electrical Grid (www.ere-security.ca and http://www.networkworld.com/news/2010/060210-nerc-cyberattack-power-grid.html?page=1.) In my opinion, while NERC (North American Electric Reliability Corporation, www.nerc.org ) has managed to accurately identify real security... Read More

New security/management software targets enterprise smartphones
A new client-server product uses a smartphone-based agent and server-based application to create and enforce security and management policies for four leading mobile operating systems. Read More


E-GUIDE: Compuware

Perfecting Application Performance
The enterprise application scene has become increasingly complicated over the years. Things have changed with the rise of Web services, SOA, Virtualization and cloud computing. In this Executive Guide explore how to get the best performance out of today's application environments. Read Now.

Hacker justifies turning in Wikileaks informer
Former hacker Adrian Lamo has claimed to be the source who informed on a US soldier accused of sending the Wikileaks whistleblowing site video footage of a helicopter shooting unarmed Iraqi civilians. Read More

Zombie PCs to be quarantined under new ISP code
The Internet Industry Association (IIA) has urged ISPs to better secure their networks by adopting recommendations in a new voluntary code of practice on cyber security. Read More

Amazon encrypts CloudFront, but security comes at a price
Amazon Web Services' content delivery network service CloudFront can now transfer data over an encrypted HTTPS connection, but users will pay more than if they transfer it via HTTP, Amazon said on Monday. Read More

Group lists top five social media risks for businesses
As businesses increasingly trying to figure out how to use social networking tools in the enterprise, an IT governance group has released a ranking of the top five risks that social media poses to companies. Read More


WHITE PAPER: Novell

Intelligent Storage Management at the File Level
Many storage management tools for file storage are "dumb." They treat all files the same regardless of business relevance and they lack the ability to automate user-storage management tasks or set policies based on business requirements. Learn how to augment your existing storage management system with intelligence at the file level. Read Now

FAA lab to explore unmanned aircraft impact, new navigation concepts
The Federal Aviation Administration this week said it opened a new laboratory where scientists will use computer simulation technology explore how future systems such as unmanned Read More

Truedomain debuts domain protection services
Start-up Truedomain aims to stop e-mail-borne phishing attacks that exploit the domain names of legitimate businesses. Read More

HP lawyer: Tech industry needs to focus more on privacy
The technology industry is facing an "erosion of trust" from customers because of concerns over privacy violations and cybersecurity problems, Hewlett-Packard's general counsel said Tuesday. Read More

Activists worry about a new 'Green Dam' in Vietnam
Human rights activists are worried that new software mandated by Vietnamese authorities may lead to an Internet clampdown in the country's largest city. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Computerworld and Network World: Best of Green IT

Computerworld and Network World: Best of Green IT Computerworld and Network World are teaming up to identify the top organizations leading the way with green-IT efforts and the coolest green-IT products. Computerworld will feature two ranked lists in its Oct. 25 issue: Top green-IT end-user organizations and a Top green-IT data center suppliers/vendors. Network World will feature the most effective green-IT products, as cited by survey respondents, in its Oct. 25 issue and online. Please fill out our short survey or forward this link to the person in your company best able to answer questions about IT energy issues. Surveys should be submitted by Thursday, July 1 at 12 noon EST.

SLIDESHOWS

10 useful Firefox-based apps
Here are 10 useful desktop programs that run on the open-source Web browser's native technology. All of these applications are free for you to download and use -- and only one is a Web browser.

5 things we love/hate about cloud automation tools
Here are some things we love and some things we hate about cloud automation tools.

MOST-READ STORIES

  1. Six misconceptions about cloud apps
  2. Scientist 'infected by computer virus' catches publicity fever
  3. Some iPhone 4 features will be marred by poor networks
  4. No 4G for Apple's iPhone 4
  5. What would your ultimate network security look like?
  6. AT&T details early iPhone 4 eligibility, pricing
  7. Networking's 20 greatest arguments
  8. Apple announces iPhone 4
  9. Ubuntu Linux wins over Windows power user
  10. An open letter to Dan Hesse, Sprint CEO

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: