Search This Blog

Friday, January 14, 2011

Google pays record bounty for Chrome bug

Top IT Priorities for 2011 | Watchdogs sniff out 6 critical cybersecurity challenges facing the electrical grid

Network World Security

Forward this to a Friend >>>


Google pays record bounty for Chrome bug
Google Thursday said it patched 16 bugs in the Chrome browser, including one tagged as critical that brought its founder a record $3,133 bounty. Read More


WHITE PAPER: ParAccel

The Problem with Data Warehousing
Tackle the most complex analytic challenges and glean insight from vast amounts of data. Learn how a columnar-based, massively parallel processing analytic database can provide high performance analytics against complex SQL workloads the most challenging analytic queries. Read now!

WHITE PAPER: IBM

Prepare IT for Growth
The need has never been so great to balance evolving IT Services with reduced IT budgets. Learn to position your organization for growth in this uncertain business climate. Read Now

Top IT Priorities for 2011
Server virtualization, managing data, and information security top the listAccording to the ESG Research 2011 IT Spending Intentions survey, here are the 5 IT priorities for large mid-market (i.e. 500-1000 employees) and enterprise (i.e. more than 1000 employees) organizations over the next 12-18 months: 30% Increase use of server virtualization 24% Manage data growth 24% Information security initiatives 23% Major application deployments or upgrades 22% Improve data... Read More

Watchdogs sniff out 6 critical cybersecurity challenges facing the electrical grid
As the country's electricity grid undergoes a transformation and moves toward a more intelligently networked, automated system, it faces an increasing amount cybersecurity issues. Read More

Fruit fly looks to be one good bug for computer networks
CMU, Israeli researchers create algorithm that could boost wireless and other distributed networksThe simple yet sophisticated nervous system cells in the bodies of fruit flies are being used as a model that could make wireless sensor networks and other distributed computing systems work better. Researchers at Carnegie Mellon University, Tel Aviv University and the Weizmann Institute of Science in Israel have published their findings on this topic in the Jan. 14 issue of the journal Science in... Read More


WHITE PAPER: Quest Software

Combating Security and Compliance Challenges
Don't wait for a security breach or compliance issue to damage your company. Ongoing monitoring can proactively identify and reduce threats. Learn how you can successfully stop security issues before they become serious problems. Read More

Three fired for accessing records of Tucson shooting victims
Three employees at Tucson's University Medical Center have been fired for improperly accessing the medical records of some of the victims in Saturday's shooting spree that killed six people and wounded 14, including U.S. Rep. Gabrielle Gifford Read More

'Patriot Act' phishing e-mails resurface, FDIC warns
Scammers are trying to steal banking information using fake e-mails that look like they've come from the U.S. Federal Deposit Insurance Corporation, the FDIC warned Wednesday. Read More

Former TSA contractor gets two years for damaging data
A former U.S. Transportation Security Administration contractor will serve two years in prison for messing with sensitive government databases used to identify terrorists as they try to enter the U.S. Read More


WEBCAST: Mainsoft

'Social Email' Drives 4th Generation Collaboration Solutions
Enterprises today are investing in a host of collaboration tools, including SharePoint, but they remain underutilized. Hear Gartner analyst Matt Cain and Mainsoft CEO Yaacov Cohen talk about how to close the user adoption gap by bringing SharePoint collaboration and social features into email. View Now.

Wikileaks and the authorized insider threat
The recent military and U.S. State Department Wikileaks fiasco epitomizes a key challenge to data security and privacy today: the authorized insider threat. Read More

Most business confident they secure credit card data
Cisco surveyed over 500 businesses about their PCI experiences. Some surprises for sure In one of the most comprehensive PCI related surveys ever completed we find some very interesting results. This Cisco commissioned survey of 500 U.S. based companies asked IT decision makers questions around their PCI compliance efforts. The survey covers a broad scope of verticals such as healthcare, retail, education, government and financial sectors. Over 22% of the businesses surveyed had over... Read More

Parental control programs perform poorly with Web 2.0 sites
A survey by the European Commission has found that parental control programs aimed at keeping children safe online do not function well with Web 2.0 sites, smartphones or games consoles. Read More

Spam Traffic Returns after Holiday Break
Spammers are people too...apparently. They have families and want to take a vacation to spend quality time with them over the traditional holiday break just like everyone else. Or, at least that is the way that it appears if you follow the trends in spam traffic. Read More



BECOME AN INSIDER
Get premium content, in-depth reviews, practical tips and exclusive research. All for just signing up. Sign up for free today.

SLIDESHOWS

12 geekiest snow and ice sculptures
Not all tech weenies hunker down indoors when the snow starts piling up and the ice coats the streets. Some put on their mittens and boots and go to work creating fantastic snow and ice sculptures celebrating their tech favorites.

2011's 25 Geekiest 25th Anniversaries
Our fifth annual collection of the year's "geekiest anniversaries" kicks off with The Mentor's "Hacker's Manifesto" and includes such memorable characters as Captain Midnight and Ferris Bueller, institutions the likes of the IETF and Spy magazine, and inventions like the Super Soaker and disposable camera.

MOST-READ STORIES

  1. Microsoft guy slams "President of the United States of Google"
  2. Facebook, Google, Yahoo commit to 'World IPv6 Day' trial
  3. Will Apple remove home button from next-gen iPad, iPhone?
  4. 2011's 25 geekiest 25th anniversaries
  5. Facebook wants to issue your Internet driver's license
  6. Kama Sutra malware may put Windows users in awkward position
  7. Palin e-mail snoop imprisoned, despite judge's recommendation
  8. Apple is professional Linux
  9. Sony shutting plant that used to make 18M CDs a month
  10. Google pays record bounty for Chrome bug

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: