Search This Blog

Tuesday, January 11, 2011

Adobe Sandbox Protection Hacked

Protecting Data on Portable Drives | Author warns of Russia's and China's 'Spinternet'

Network World Security

Forward this to a Friend >>>


Adobe Sandbox Protection Hacked
Last year Adobe got the message that it was the target du jour for malicious attacks and stepped up its efforts to secure and protect its software. However, a security researcher revealed that one of the security measures developed by Adobe can be circumvented with relative ease. Read More


RESOURCE COMPLIMENTS OF: Palo Alto Networks

Trust Matters
Who do you trust to safely enable apps on your network? Palo Alto Networks released the first firewall to use application identity, rather than port, in 2007. Since then, over 3000 customers have been using our next-gen firewalls to safely enable apps. This innovative approach is fundamentally different than Check Point's solutions. Find out how.

WHITE PAPER: Watchguard

Cloud-based Web Security Isn't Hype - It's Here and It Works
Clear threats are rejected at the connection level, eliminating much of the scanning and processing demands on your network. That means both better protection and better performance. Too good to be true? Believe it. Read now!

Protecting Data on Portable Drives
It is almost mind-boggling how much data can be stored on a portable drive or USB thumb drive. As convenient as it is it to be able to carry 1TB of data in your pocket, though, portable drives are also easily lost or stolen, and gallivanting about can take its toll on the data. It is important to protect the portable drives and the data they contain. Read More

Author warns of Russia's and China's 'Spinternet'
Is the Internet, with its blogs, tweets, e-mail, Web and social networking sites, a force to change places such as Iran, China, Vietnam and Russia into Western-style democracies with the West's ideas about freedom of expression and political rights? Read More


WHITE PAPER: Quantum Corporation

Long-Term Data Retention – Key Considerations
Managing backup and recovery in today's environment is a multi-dimensional challenge with both near and long-term business requirements. Recent technological developments in disk backup have had a positive impact on short-term data retention strategy. This tool provides key topics to think about as you design your long-term data retention plans. Read Now

White House officials push online trusted IDs
The U.S. Department of Commerce launches an office focused on trusted ID technology. Read More

Trend Micro shows Android SMS blocking app
Android is a long way from being overrun with security threats but that hasn't stopped Trend Micro getting its retaliation in early with a new security app for the platform. Read More


WHITE PAPER: Symantec

Next Generation Data Protection
These next generation tools, such as disk based backups, deduplication, virtualization, archiving, and continuous data protection, are essentially revolutionizing the world of data protection. download this whitepaper to find the newest approach to unified data protection. Read now!

Looking ahead to 2011: Cloud, regulation, VoIP and more
Picking up where we left off as we closed last year with part one of our 2011 predictions, today we'll continue our discussion, outlining what we expect to happen this year with hosted/cloud services, net neutrality, VoIP evolution, and consolidation trends. Read More

RIM to block access to porn on BlackBerry in Indonesia
Research in Motion said Monday it will work with Indonesia's carriers to filter out pornography websites as soon as possible for BlackBerry subscribers. Read More

Spam Clock Tallies Junk on the Internet
You've probably heard of the Doomsday Clock. It was created in 1947 by the Bulletin of Atomic Scientists to give mankind an idea of how close it is to catastrophic destruction. A similar clock has been launched by search engine newcomer Blekko, only it's counting how many spam pages are created on the Internet every second. Since January 1 alone, 156.8 million spam pages have been created on the Web, and the clock keeps counting and counting.... Read More



BECOME AN INSIDER
Get premium content, in-depth reviews, practical tips and exclusive research. All for just signing up. Sign up for free today.

SLIDESHOWS

The weirdest, wackiest and stupidest sci/tech stories of 2010
It's hard to pick the weirdest and wackiest tech stories of 2010 considering there is so much nuttiness to choose from. But we'll give it a shot. Here we take a look at a number of stories that gave us pause in 2010.

2010's most popular iPad apps
As the iPad celebrates its first birthday, it should raise a glass to Apple's App Store, which has provided users with an array of innovative applications. Late last week, Apple released a list of the 10 most popular iPad applications, with productivity apps making up the bulk.

MOST-READ STORIES

  1. Digg founder: Don't buy an iPad now
  2. Gov't allegedly forced TruTV to yank FEMA camps episode
  3. Apple, Linux welcomes you to 1998!
  4. The 11 hottest Windows and Android tablets unveiled at CES
  5. Can Firefox get its mojo back?
  6. The 5 coolest things to come out of CES
  7. Cisco compacts Catalyst switches
  8. Jobs sticks with $1 salary while COO Cook nets $59.1 million
  9. Verizon iPhone expected Tuesday
  10. Verizon iPhone: What it'll look like inside and out

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: