Search This Blog

Thursday, January 13, 2011

Microsoft needs to get in front of WP7 glitch, pronto

Federal watchdogs outline 6 critical electricty grid cybersecurity challenges | Kama Sutra malware threatens to put Windows users in awkward position

Network World Security

Forward this to a Friend >>>


Microsoft needs to get in front of WP7 glitch, pronto
Limited comment on "phantom data" reports can hurt image of nascent platformMicrosoft remains frustratingly tight-lipped about a number of reports of users of Windows Phone 7-powered smartphones reporting excessive amounts of data usage that seem to be happening without the users' knowledge. It's been called "phantom data" in some reports. The reports have been anecdotal so it's hard to know how widespread they might be, but Microsoft's silence on the issue isn't... Read More


WHITE PAPER: Quantum Corporation

Long-Term Data Retention – Key Considerations
Managing backup and recovery in today's environment is a multi-dimensional challenge with both near and long-term business requirements. Recent technological developments in disk backup have had a positive impact on short-term data retention strategy. This tool provides key topics to think about as you design your long-term data retention plans. Read Now

WEBCAST: Cisco

Mobile Powerplay: Secure, High Performance, Unified
The mobile revolution is here—and here to stay. iPhone, iPad, Droid--employees bring their mobile devices into the workplace, and they want access to personal and professional information. This brings a new set of concerns for IT and the business: IT needs to ensure that the corporate network and the access remains secure. Register Now

Federal watchdogs outline 6 critical electricty grid cybersecurity challenges
Features, regulation, compliance issues dog smart grid cybersecurityAs the country's electricity grid undergoes a transformation and moves toward a more intelligently networked, automated system, it faces an increasing amount cybersecurity issues.  Read More

Kama Sutra malware threatens to put Windows users in awkward position
A Sophos IT security consultant has issued a warning not to fall prey to malware that uses a PowerPoint presentation demonstrating sexual positions from the Kama Sutra as its lure. Read More

2011's 25 Geekiest 25th Anniversaries
Our 5th annual stroll down the techie side of Memory Lane Five years makes an official franchise, no? Either way, what follows is this year's edition of our annual collection of the year's "geekiest anniversaries." This text version is offered for those of you don't care for slideshows. All the pretty - and in some cases iconic - photos can be found here. Read More


WHITE PAPER: ParAccel

Tackle the Most Challenging Analytic Queries
Learn how a columnar-based, massively parallel processing database can provide ultra fast analytics with: • Schema-neutral, load-and-go analysis • High performance against complex SQL workloads • All-in-memory processing Read now!

Spectrum analyzer catches exam cheats in Taiwan
Police in Taiwan used a set of spectrum analyzers to catch at least three people suspected of cheating on an exam by monitoring them for mobile phone signals, a first case of its type, the equipment maker said on Wednesday. Read More

Sony asks for restraining order over PS3 hack
Sony Computer Entertainment has launched legal action against five hackers who recently released a set of tools that allows illegally copied games to run on the PlayStation 3 game console. Read More

Survey on PCI: How it's impacting network security
A survey of 500 information technology professionals with responsibility to assure compliance with the Payment Card Industry (PCI) security standard shows just over half find it "burdensome but necessary" in their organizations and about a third see it impacting their virtualized network environments in particular in the future. Read More


WHITE PAPER: ArcSight

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center

Hoax smartphone apps: a security headache in 2011
Hoax smartphone apps that masquerade as a game or app but actually steal personal information from the handset such as passwords and logins will be one of four internet scams causing problems for Brits in 2011, says Knowthenet.org.uk. Read More

Obama Administration fleshes out online trusted IDs
The National Institute of Standards and Technology (NIST) has established a new Web site fleshing out the Obama Administration's plans for a National Strategy for Trusted Identities in Cyberspace (NSTIC). Read More

Security firm: Facebook is biggest mobile malware threat
The biggest mobile infection threat isn't malware that specifically targets mobile devices, according to new research from security firm BitDefender. Malware that targets Facebook is a far bigger problem for mobile security, the firm claims. Read More

Microsoft turns to creative tactic to block IE attacks
Microsoft today turned to a new defensive measure to help users ward off ongoing attacks exploiting a known bug in IE. Read More



BECOME AN INSIDER
Get premium content, in-depth reviews, practical tips and exclusive research. All for just signing up. Sign up for free today.

SLIDESHOWS

The weirdest, wackiest and stupidest sci/tech stories of 2010
It's hard to pick the weirdest and wackiest tech stories of 2010 considering there is so much nuttiness to choose from. But we'll give it a shot. Here we take a look at a number of stories that gave us pause in 2010.

2010's most popular iPad apps
As the iPad celebrates its first birthday, it should raise a glass to Apple's App Store, which has provided users with an array of innovative applications. Late last week, Apple released a list of the 10 most popular iPad applications, with productivity apps making up the bulk.

MOST-READ STORIES

  1. Facebook, Google, Yahoo commit to 'World IPv6 Day' trial
  2. Sony shutting plan that used to make 18M CDs a month
  3. The Verizon iPhone: Seven key facts you need to know
  4. 2011's 25 geekiest 25th anniversaries
  5. Author warns of Russia's and China's 'Spinternet'
  6. Apple iPhoneys: the iPhone 5 edition
  7. Microsoft fights Apple trademark on 'App Store'
  8. AT&T and Verizon iPhone plans compared
  9. Cisco attorney's perceived anti-Semitism sends company back to court
  10. Be like Larry and Sergey: Google invites teens to online science fair

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: