Search This Blog

Thursday, March 10, 2011

Google still scrambling to recover from DroidDream Android attack

9 Security Tips for Protecting Mobile Workers | Blistering "micro drum" bangs 11 million times per second

Network World Security

Forward this to a Friend >>>


Google still scrambling to recover from DroidDream Android attack
Last week's revelation that over 50 apps in the Google Android market were malware-laden has shaken up Google and the security industry to its core. Read More


RESOURCE COMPLIMENTS OF: Lumension

Reduce IT Risk with Patch Management
Lumension® Patch and Remediation reduces your IT risk by automating and streamlining patch management across heterogeneous operating systems and third party applications. With Lumension, you can take control of both online and offline PCs and reduce your IT complexity. Learn more or evaluate this award-winning solution today Click to continue

WHITE PAPER: CA

Defending Against Insider Threats
Organizations must accept the reality that insider threats are no longer an abstract concept. This paper explains the factors that are increasing the insider threat and details a proactive approach that leverages identity and access management to reduce risk and improve compliance. Learn More

9 Security Tips for Protecting Mobile Workers
The new working professional is always connected, and increasingly, the office is Starbucks, an airport, or home. With new flexibility comes new IT security risks for businesses. Basic defenses like antivirus are important, but not enough to keep corporate data from the increasingly sophisticated hacker. Read More

Blistering "micro drum" bangs 11 million times per second
Micro drum is part of NIST quantum computing experimentsSome heavy metal rock band might love this technology. Scientists with the National Institute of Standards and Technology (NIST) have demonstrated an electromechanical micro drum that can vibrate an astounding 11 million times per second. Read More

The eight most important commands on a Cisco ASA security appliance
The Cisco ASA sports thousands of commands, but first you have to master these eight.Here's a guest post sent to me by Don Crawley, author of The Accidental Administrator book series. It is an excerpt from his latest: The Accidental Administrator: Cisco ASA Security Appliance: A Step-by-Step Configuration Guide Read More


WEBCAST: Trend Micro

Deep Security with Trend Micro
Watch this video of users of Trend Micro Deep Security and hear how it is ensuring regulatory compliance and preventing server, desktop and cloud data breaches. View now!

Having a career year? 15 career issues you should know about
What are the key challenges for your career? As we look across the IT career landscape there are a number of new challenges. The whole IPv6 migration issue has changed some job opportunities for example. Cloud computing offers to bring more IT jobs and security issues could change everyone's job at some point. Here we take a look at some of the hot topics trending in the career world. Read More

Tests find security programs fooled by attack vector
A new round of antivirus testing found some products fail to detect malware that tries to infect a computer via a different attack vector, such as through a local network fileshare or a USB drive. Read More

4 Virtualization Security Basics to Watch
While mobile and smartphone security is the hot topic of the moment among virtualization security gurus, plenty of other virtualization security topics demand IT's attention right now. At the recent RSA Security Conference in San Francisco, the interest in virtualization security ran high - with good reason. Different IT departments are at different points on their virtualization journeys, of course, and some are still thinking about security in the old physical world terms, analysts say. Read More


WHITE PAPER: BMC

Going Beyond the Obvious to Find Real Cost Savings
This paper, from industry analyst firm Enterprise Management Associates, explores how workload automation can help IT reduce outages, consolidate vendors, improve integration, and cut costs. Learn more. Download the white paper, "IT Automation: Going Beyond the Obvious to Find Real Cost Savings." Read More!

Big Data mining: Who owns your social network data?
An attractive application of Hadoop and other Big Data technologies is to analyze users' social activities, sometimes without their express knowledge Read More

Backups as an anti-plagiarism tool
Over several decades in academia, any professor is likely to encounter at least a few cases of plagiarism from foolish students. One of the most pernicious types of plagiarism involves theft of papers from a roommate's computer. The story usually goes something like this: Read More

Apple patches critical Mac bugs with Java updates
Apple Tuesday shipped its first Java update for the Mac OS since last fall, when it also disclosed plans to 'deprecate' the Java runtime in Leopard and Snow Leopard. Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a Windows 7 Enterprise Technician class for three people. From Cisco Subnet: 15 copies of VMware ESXi books. Enter here.

SLIDESHOWS

20 awesome tech products at DEMO
Build-your-own iPhone and Android apps, cloud services, photo tools and more on display at DEMO Spring 2011.

Top 10 Chrome OS extensions
Though Google is pitching it as an operating system for netbooks and lightweight notebooks, Chrome OS is essentially the Chrome Web browser bolted on top of a bare minimum version of Linux. The following extensions can improve the user experience of Chrome (OS or browser) to give you some of the functionality found in a traditional operating system.

MOST-READ STORIES

  1. Ex-Microsoft CTO publishes groundbreaking cookbook
  2. Harvard computer scientist Leslie Valiant wins Turing Award
  3. iPhone 5 to sport aluminum back, redesigned antenna, A5 chip
  4. VMware unleashes virtual desktops for Apple iPad
  5. Researchers unmasking anonymous e-mail senders
  6. Go for it on fourth down? Ask Coach Watson
  7. 5 things iOS 4.3 brings the iPad and iPhone
  8. Real ID: DHS national ID nightmare that won't die?
  9. Microsoft pushes more Kinect-like user interfaces
  10. Researcher blows $15,000 by reporting bug to Google

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: