Search This Blog

Wednesday, June 01, 2011

More malware apps sneak into Google Market

Security worries a barricade to more cloud deployment: study | Mac Defender: Did you really think Apple Macs couldn't be hacked?

Network World Security

Forward this to a Friend >>>


More malware apps sneak into Google Market
More malware targeting Google Android devices but pretending to be legit apps managed to sneak into Google Market over the long holiday weekend, and Google did take steps to yank them, according to a mobile security firm. Read More


WHITE PAPER: Dell

The Business Case for Security Information Management
It is a mistake to assume that information security is solely a technical problem left for IT to solve. This guide is a non-technical discussion of security information management. Learn more.

WHITE PAPER: F5 Networks

Manageable Application Security
Investments in security solutions have to provide a clear value, which equals additional time spent collecting and documenting proof of this value. The latest version of F5 BIG-IP Application Security Manager(tm) (ASM), v10.1, addresses information overload and the need for agility in implementation. Learn more!

Security worries a barricade to more cloud deployment: study
Concerns about the security of cloud applications are keeping a significant number of organizations from going further with deploying more of the technology, according to a new report. Read More

Mac Defender: Did you really think Apple Macs couldn't be hacked?
There is nothing sadder than witnessing reality give millions of people a wakeup call, shattering their sense of invulnerability. Mac users got to experience a taste of what their PC counterparts have had to live with for years, with a little bit of malware called Mac Defender. Apple Mac users have enjoyed a bit of obscurity over the years as most of the malware variants were targeted at the 98% market... Read More


WHITE PAPER: Aerohive

Economics of Cooperative Control: Protocols are Free
Inter-AP protocols are free, but controllers are not. Aerohive's Cooperative Control controller-less WLAN architecture delivers an immediate and extremely significant CAPEX decrease. This paper explores the expansive economic benefits of Aerohive's unique approach. Read now!

5 top social media security threats
Social media platforms such as Twitter, Facebook and LinkedIn increasingly are being used by enterprises to engage with customers, build their brands and communicate information to the rest of the world. Read More

Google Wallet: Five things you need to know
Now that Google has officially released its Google Wallet mobile payment platform, here are five things you need to know about it. Read More


WHITE PAPER: Aerohive

SLA Compliance: Wireless Fidelity Achieved
Aerohive delivers the next level in network visibility and reactive response with a new infrastructure-side performance monitoring and response system: SLA Compliance. Read now!

Two convicted in U.S. over counterfeit Cisco gear
A U.S. federal jury convicted two people this week over a scheme to import and sell counterfeit Cisco-branded networking equipment, the Department of Justice said on Thursday. Read More

Mobile phones are great for phishers, researchers find
Computer users seem to be getting better at spotting fake websites that are trying to steal their passwords, but when it comes to mobile phones, the deck is most definitely stacked against them. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Microsoft Subnet: A set of classes for a Microsoft Cert from Webucator and Polycom videoconferencing system.. Enter here.

SLIDESHOWS

7 things we love about Drupal 7
Drupal. the open source Content Management System (CMS) used to power everything from personal sites to the White House's Web site, is legendary for its flexibility and power. Here are the best things about it.

MOST-READ STORIES

  1. 5 top social media security threats
  2. Worst hackers ever?
  3. 4G faceoff: ThunderBolt vs. Galaxy
  4. iPhone 5 rumor roundup for week ending May 27
  5. Windows 1.0: Still playing Reversi after all these years
  6. RSA tokens may be behind network security problems at Lockheed Martin
  7. Google Wallet: Five things you need to know
  8. Preparing for World IPv6 Day
  9. Leading FCoE server company? It ain't Cisco
  10. PBS hacked by LulzSec: Lulz boat sailed, PBS failed

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: