Search This Blog

Monday, November 29, 2010

How secure is Windows Phone 7 app code?

WikiLeaks: China was behind Google hack | Comcast outage encourages DIY DNS fix for some

Network World Security

Forward this to a Friend >>>


How secure is Windows Phone 7 app code?
A recent Microsoft glitch made it possible for developers to bypass the Zune marketplace and download their Windows Phone 7 app of choice. Though Microsoft closed that loopohole, the incident sparked debate over how to secure application code, a problem that affects more than WP7 developers. Read More


RESOURCE COMPLIMENTS OF: VeriSign, Inc.


VeriSign® SSL Certificates now come with new features! Learn more!

E-BOOK: Palo Alto Networks

Get the "Next-Generation Firewalls for Dummies" Book
This book provides an overview of next-gen firewalls. Get your copy to find out: How Enterprise 2.0 applications create new risks for your organization? Why traditional firewalls can't protect your network? How next-generation firewalls stand apart from other security solutions? Click to continue

WikiLeaks: China was behind Google hack
China's Politburo directed attack, one of many cyber espionage actsThe much publicized attack on Google's computer systems in China earlier this year was directed by China's Politburo, according to classified U.S. government documents released by the Web site WikiLeaks.org and reported today by several news organizations. Read More

Comcast outage encourages DIY DNS fix for some
Updated: Service disruption hits much of East CoastComcast customers on the East Coast looking to get an early jump on their Cyber Monday shopping last night were stymied by a DNS-related Internet service disruption. However, a number were able to fashion their own fixes to the problem after being directed to alternatives such as OpenDNS and Google Public DNS. Read More


WEBCAST: Netop

Best Practices for Remote Support
Join this live Webcast December 7th at 1 PM ET to hear practical advice on deploying remote support without putting your organization at risk. You'll learn how companies from regulated industries are implementing remote support and since this event is live, you'll have a chance to ask the experts your specific questions. Join us for this Live Event

Mobile management and security: Keeping the dark side at bay
A long time ago in an enterprise far, far away mobile devices were secure. Enterprises had limited mobile solutions; RIM BlackBerries and Palm Treos were your options. Read More

'Nightmare' kernel bug lets attackers evade Windows UAC security
Microsoft is investigating reports of an unpatched vulnerability in the Windows kernel that could be used by attackers to sidestep an important operating system security measure. Read More


WHITE PAPER: HP

Virtualizing Network Connections and Capacity
Read this whitepaper to learn how HP FlexFabric can provision your network resources efficiently and securely to accelerate deployment of virtualized workloads. Read Now

Space laser could let company's track items, reduce counterfeiting
Space laser can inscribe ID numbers in glass without damaging itLaser technology developed to etch the surfaces of space measuring equipment,  telescope lenses and mirrors is now being touted as a way to inscribe identity numbers in all manner of glass items from medical syringes and bottles to car parts for traceability and anti-counterfeit application. Read More

Porn sites should be filtered by age, demands British MP
A conservative MP has called for UK Internet service providers to protect youngsters by introducing an age-rated opt-in system for online porn. Read More

On Santa's 'Naughty' list: credit card skimmers
When you're out there doing your holiday shopping and you hand your credit or debit card to the store clerk, keep a keen eye on what he does with your card. Credit card skimming is on the rise, and we have 30-year-old technology to blame for it. Read More

TalkTalk to trial controversial malware scanning system
TalkTalk, the Internet Service Provider (ISP), is set to trial a malware detection system, called Virus Alerts, with some of its customers. Read More



Fill out a survey, get rewarded

Get a free Starbucks gift card for participating in a Network World survey about application performance management best practices. Research firm NetForecast is surveying enterprises about APM practices for an upcoming Network World article. The first 100 participants will receive a $5 Starbucks gift card. Click here.

Goodies from the Subnets
We've got SharePoint 2010 training for up to three people from Webucator up for grabs. There's an iPad available, too. Enter to win one!

SLIDESHOWS

Top IT Turkeys of 2010
Thanksgiving is a time for giving thanks for all of the people and things we love, to cherish what's most important to us. But that's for another slideshow. This one's all about taunting the companies, products and people who most resembled a turkey over the last year. So cut me a hockey-puck-shaped slice of jellied cranberry sauce and read on.

Cool Yule favorites: 15 techie gifts we like
Ho Ho Ho, it's time again to get our holiday wish lists together. Here are our 15 favorite products from the 140+ products submitted and tested in this year's Cool Yule Tools holiday gift guide.

MOST-READ STORIES

  1. HTTPS everywhere gets Firefox "Firesheep" protection
  2. Create the ultimate car PC
  3. China Internet 'hijack' hugely exaggerated, says researcher
  4. Why any great career move should be known as 'a Schmidt'
  5. One less thing: Apple bans Steve Jobs doll
  6. Oracle awarded $1.3 billion in SAP lawsuit
  7. IT user supergroup forces vendors to take notice
  8. Analyst calls unified communications "greatest scam since Ponzi"
  9. Microsoft spying on users for free
  10. What to expect from next month's Verizon LTE launch

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: