Friday, July 08, 2011

Quick Takes on Microsoft: Security, Baidu and Rustock

Top 5 worries keeping IT pros up at night | PDFs that exploit iPhone, iPad zero-day available on the Web

Network World Security

Forward this to a Friend >>>


Quick Takes on Microsoft: Security, Baidu and Rustock
  Despite a long weekend, Microsoft has been busy. All of these little items are too small to warrant a blog post, so here they are as a bunch of quick hits, along with an interesting rumor. Read More


WHITE PAPER: Dell

IT Managers Face Security Challenges with Mobile Devices
A recent IDG survey reveals data security is the top barrier to supporting employees' mobile devices. Read more

WHITE PAPER: EMC

The Changing Role of Network Management
Read how new challenges in IT like virtualization and cloud computing are changing the role of Network Managers, who are now required to leverage automation and integrated solutions even further to adapt to these changes. Learn how EMC Ionix Network Solutions help Network Managers overcome these challenges. Read now

Top 5 worries keeping IT pros up at night
What keeps you up at night? IT pros share what weighs most heavily on their minds. Read More

PDFs that exploit iPhone, iPad zero-day available on the Web
German government security officials warned that one of the recently revealed Apple iOS flaws could be put to malicious use. Read More

Cool iPhone space-watching apps
NASA, space shuttle launch, star gazing, space weather lead package of cool iPhone apps Read More


WHITE PAPER: Raritan

Data Center Transformations
Build outs, consolidations and acquisitions are large-scale projects that can be very disruptive and require careful planning and implementation to maintain operations. This white paper examines the process and what's required to meet IT goals and objectives and maintain business continuity. Read now!

The Latest Security Tool for Your Arsenal: Whitelisting
Phishing, spear phishing, trojan horse and other attacks are growing in number and sophistication, seemingly by the day. There can be little disputing that notion after RSA, Sony, Lockheed and Citicorp were embarrassed by breaches this year. Read More

Washington Post reports data breach on job ads section
The Washington Post has alerted job seekers who use its employment pages of a data breach that compromised up to 1.27 million accounts. Read More

DHS tests show security's people problem
A U.S. Department of Homeland Security test that found some workers plugging found USB drives into work computers and others who provided passwords to fake support people shows how inadvertent employee miscues are often at the center of security breaches. Read More


WHITE PAPER: Shoretel

Reduce Cellular Spend With ShoreTel Mobility
Organizations continue to spend valuable budget on international and long distance calls. This white paper shows how a multi-location organization can reduce cellular spend by leveraging current Wi-Fi and dual-mode smartphone deployments, and offloading expensive minutes from cellular networks to virtually free WLAN networks. Read now!

Jailbreak artists exploit unpatched Apple iPhone, iPad bugs
Developers today said they used a pair of unpatched vulnerabilities in Apple's iOS to "jailbreak" the iPhone and iPad, including the first-ever hack of the iPad 2. Read More

Privacy groups protest proposed E-Verify bill
A proposal to force employers to use the federal E-Verify system to vet new and current workers has stoked widespread privacy concerns. Read More

US Army wants soldiers to have advanced smartphones, wireless technology
As the U.S. Army ponders how to give every soldier a smartphone loaded with apps for military purposes -- and be able to support global communications not only with commercial cellular networks like Sprint, Verizon or AT&T -- it is also exploring how it can quickly set up its own wireless network almost anywhere in the world. Read More

The Best of 'Damn You, Autocorrect'
Smartphones try to predict or correct words in the text messages people type, sometimes with disastrous results. Here are some of the best text-messaging gaffes submitted to damnyouautocorrect.com. Read More

Financial services firms get updated authentication guidance
This month's update is designed to reinforce risk-based authentication for customers and covers layered security and other controls designed to mitigate transaction risk. Expert reaction to the guidance's efficacy is mixed. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Microsoft Subnet: A set of classes for a Microsoft Cert from Webucator and Polycom videoconferencing system. Enter here.

SLIDESHOWS

Five potential Facebook killers
The social networking scene is constantly in flux. Facebook is at the top of the heap right now, but challengers are springing up all the time, hoping to leverage the next big wave into a lucrative IPO. Here are five social media sites that are creating a buzz.

MOST-READ STORIES

  1. Microsoft: We're not vulnerable to DDoS attacks
  2. Microsoft patent division taking cash from at least 5 Android vendors
  3. Google+ Privacy: 5 settings you need to know
  4. 5 hot social networking sites
  5. Microsoft pays customer $250,000 to use Office 365
  6. IETF mulls IPv6 for home networking
  7. The Microsoft/Android war: Which patents are at stake?
  8. Farewell to the DS-0?
  9. Microsoft, Citrix join VMware at top of Gartner's Magic Quadrant
  10. 12 ways the cloud changes everything

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment