Wednesday, June 29, 2011

Symantec finds big differences in iOS, Android security

Companies try to allay privacy fears at FCC-FTC hearing | IBM exposes top future networked healthcare devices

Network World Security

Forward this to a Friend >>>


Symantec finds big differences in iOS, Android security
Apple iOS and Google Android have some big differences when it comes to mobile security, creating distinct potential vulnerabilities for enterprises embracing devices running these operating systems, according to analysis by Symantec. Read More


WHITE PAPER: Dell

The Business Case for Security Information Management
It is a mistake to assume that information security is solely a technical problem left for IT to solve. This guide is a non-technical discussion of security information management. Learn more.

WHITE PAPER: F5 Networks

Providing Security and Acceleration for Remote Users
Delivering applications to remote users is a significant undertaking. Applications need to be available, and they must be delivered securely and quickly. Through a range of products, F5 has solved the security plus acceleration challenge for remote users with BIG-IP Edge Gateway and BIG-IP APM. Read More!

Companies try to allay privacy fears at FCC-FTC hearing
Representatives from big tech companies convened at the Federal Communications Commission's headquarters to allay potential privacy concerns about location-based services. Read More

IBM exposes top future networked healthcare devices
IBM came out with a study today that looks at what future healthcare applications and devices, be they PCs, tablet or smart phone might look like.  Read More

New scoring systems for software security: CWSS and CWRAF
Companies get a framework to evaluate software vulnerabilities, as the consequences of failing to patch flaws become clearer. Read More


WHITE PAPER: IBM

Leveraging security from the Cloud
Cloud computing is a flexible, cost-effective and proven deliv-ery platform for providing business or consumer IT services over the Internet. This whitepaper discusses the who, what, when, why and how of cloud-based security services. Read Now

Supreme Court to weigh in on warrantless GPS tracking
The U.S. Supreme Court has decided to hear a case involving the government's authority to conduct prolonged GPS tracking of suspects in criminal cases without first obtaining a court warrant Read More

Mastercard.com slammed again as punishment over WikiLeaks
MasterCard's main website was unavailable for some time on Tuesday as it appeared hackers were again targeting the company for its refusal to process donations for the whistle-blowing site WikiLeaks. Read More

Cellcrypt releases encrypted voice call app for the iPhone
Cellcrypt released a version of its voice encryption software for Apple's iPhone on Tuesday, adding to its portfolio of software to prevent eavesdropping on calls. Read More


WHITE PAPER: CA Technologies

Ponemon: Security of Cloud Computing Providers
This report offers the cloud providers beliefs on the state of cloud security. In addition, it compares the findings from both reports, determining similarities and discrepancies between cloud computing users and providers. Learn More

LulzSec's parting Trojan is a false positive
The LulzSec hacking group sailed off into the sunset Saturday, leaving behind a treasure trove of stolen data along with what some antivirus programs identified as a nasty surprise for anyone who downloaded the Torrent file: a Trojan horse program. Read More

Man sentenced to 13 years in Operation 'Phish Phry'
A 27-year-old man has been sentenced to 13 years in prison for managing a phishing operation in conjunction with Egyptian hackers that looted consumer bank accounts. Read More

Federal agency issues new security rules for financial institutions
The federal agency that regulates banks today issued new rules for online security for financial institutions, instructing them to use minimal types of "layered security" and fraud monitoring to better protect against cybercrime. Read More

Hackers steal info on military, defense personnel
Email addresses and names of subscribers to DefenseNews, a highly-regarded website that covers national and international military and defense news, were accessed by hackers and presumed stolen. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Microsoft Subnet: A set of classes for a Microsoft Cert from Webucator and Polycom videoconferencing system. Enter here.

SLIDESHOWS

12 of the slickest designs in enterprise tech gear available today
Consumer devices tend to get all the praise for their designs, but there's plenty of cool equipment to be found in the enterprise market. When hardware vendors tag-team with renowned industrial designers, the results can be impressive. Here are some of our favorites.

MOST-READ STORIES

  1. Facebook bans KDE application, deletes user photos
  2. Geekiest wedding dress ever
  3. Microsoft patent may ruin Skype
  4. Rootkit infection requires Windows reinstall, says Microsoft
  5. GNU Mediagoblin Project launches
  6. 12 of the slickest designs in enterprise tech gear available today
  7. Desktop PCs: Dead as a doornail, or maybe just a fax machine
  8. Android lovers: Don't overlook Nook
  9. Cisco defending base against HP, Juniper
  10. Zillow's rewrite of real-estate history upsets some homeowners

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment