Search This Blog

Monday, November 08, 2010

Rival calls foul over Microsoft's delivering Security Essentials via Windows Update

MacBook Air Bugs Are a Reminder of iPhone Woes | A hazy view of cloud security

Network World Security

Forward this to a Friend >>>


Rival calls foul over Microsoft's delivering Security Essentials via Windows Update
Microsoft this week began offering U.S. customers its free antivirus program via Windows' built-in update service, a move one major security firm said may be anticompetitive. Read More


WHITE PAPER: Quest Software

Combating Security and Compliance Challenges
Don't wait for a security breach or compliance issue to damage your company. Ongoing monitoring can proactively identify and reduce threats. Learn how you can successfully stop security issues before they become serious problems. Read More

WHITE PAPER: Watchguard

10 questions to ask before you buy an anti‐spam solution
With so many anti-spam products on the market, how can you be sure you're getting the best solution for your business network? With these ten critical questions as your guide, you can cut through the marketing hype and zero in on the key features and benefits that should guide your decision. Read now!

MacBook Air Bugs Are a Reminder of iPhone Woes
Some users of the new MacBook Air have been reporting frustrations on the screen, such as random flashing, the appearance of horizontal or vertical lines, and in some cases, different colors filling the screen just before the computer crashes. Read More

A hazy view of cloud security
A recent survey of 384 business managers from large enterprises revealed that confusion abounds about cloud data security. Read More

German Street View error lets iPhone users see hidden images
Google is facing fresh complaints over Street View in Germany, after technical problems caused some properties to be visible rather than blurred in a preview of the service launched earlier this week. Read More


WHITE PAPER: Watchguard

Unified Threat Management - Market Review
Compare the major brands of security products by UTM throughput per MSRP dollar to see where you will get the best value for your money. Find out how you can have full UTM capabilities for comprehensive protection and still have blazing fast throughput to keep your network humming. Read now!

Facebook and Twitter Flunk Security Report Card
Ignorance is bliss, so don't read any further if you don't want to panic about Facebook and Twitter security. Read More

Boonana Trojan variant uncovered, uses same tactics
The Boonana Trojan horse that made the news last week may be more of a hydra, according to security researchers, who have uncovered another variant. However, Mac users already taking precautions have little to worry about, since the variant uses the same broad tactics as the previous known version. Read More

What You Need to Know About New IE Zero-Day
Internet Explorer is under attack again. Microsoft has issued a security advisory explaining a newly-discovered exploit impacting most versions of the Internet Explorer Web browser. The security advisory contains details about the threat, as well as some guidance to protect vulnerable browsers pending a patch from Microsoft to fix the hole. Read More


WHITE PAPER: Tripwire

Scrambling at Audit Time?
Does your organization treat compliance as a set of check boxes designed to meet the auditors' requirements? If so, you are wasting a lot of time, money and precious IT resources. This white paper is a roadmap for making compliance a painless, efficient, and routine part of your IT processes. Read now!

Cisco software mines social sites
Looking for discussion on companies, products, brands to augment customer contact, serviceCisco this week jumped into social media CRM with software that allows companies to mine through social media networks looking for discussions on those companies and their products. Cisco SocialMiner is intended to augment customer contact and service capabilities by proactively injecting customer service agents into public discussions on companies and brands in social media sites like Twitter, Facebook... Read More

Do You Know about these Real-Life NERC CIP SCADA Vulnerabilities?
Most security operations people I've spoken with at electrical utilities have a good handle on the security vulnerabilities within their own SCADA environments. Their problem is convincing their management to sufficiently fund remediation. So here are just a few SCADA security related problems we've uncovered over the years, which may be of interest to those in control of the purse strings. I'll... Read More

A Deeper Look at the CCSP and CCNP Security Co-existence and Transition
A few weeks ago, Cisco announced their new CCNP Security certification, how it relates to the still-existent CCSP. After digging into what's on Cisco's web site, reading comments from the community, and making some interpretations about what it all means, frankly I was a little disappointed in parts of what I saw. Then I had another conversations with the folks at Learning@Cisco to try and get some... Read More



Fill out a survey, get rewarded

Get a free Starbucks gift card for participating in a Network World survey about application performance management best practices. Research firm NetForecast is surveying enterprises about APM practices for an upcoming Network World article. The first 100 participants will receive a $5 Starbucks gift card. Click here.

Goodies from the Subnets
We've got SharePoint 2010 training for up to three people from Webucator up for grabs. There's an iPad available, too. Enter to win one!

SLIDESHOWS

The Google Android Quiz
Android OS, with its openness, readily developed applications and flexibility has anchored a new wave of mobile devices that are rapidly gaining popularity. Here's a quiz about the operating system, its devices and history to see how well you really know it. Keep score and rank yourself at the end.

25 hot products from new IT companies
Network World's 25 New IT Companies to Watch are building a broad array of new IT products for the cloud computing and virtualization age. Here's a look at the 25 new IT companies and the technologies they're offering.

MOST-READ STORIES

  1. Excited iFixit strips down Microsoft's Kinect game controller
  2. Researcher to release Web-based Android attack
  3. Microsoft patents 'record button on a computer system'
  4. All Windows 7 customers should consider desktop virtualization
  5. Microsoft warns of new Zero-day attack affecting IE 6,7,8
  6. Cisco rolls out social network monitoring software
  7. The 'kill switch' for Windows Phone 7 apps
  8. Network resolutions: Why aren't Cisco software updates free?
  9. Rival calls foul over Security Essentials delivered via Windows Update
  10. The 25 worst high-tech habits (and how to fix them)

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: