Search This Blog

Tuesday, August 23, 2011

Android now most attacked mobile OS, McAfee reports

Cloud Growth Prompts Shift in Enterprise Security Strategies | Cisco aims for a go-anywhere router

Network World Security

Forward this to a Friend >>>


Android now most attacked mobile OS, McAfee reports
Out of about 1,200 mobile malware samples that McAfee Labs collected and analyzed, about 60% were aimed at Google's Android operating system. Read More


WHITE PAPER: GFI Software

Messaging and Web Security Best Practices for 2011
In this white paper, Osterman Research discusses how the daily occurrence of malware within organizations has become decidedly worse over the past several years. Read More

WHITE PAPER: GFI Software

Why Customers Love VIPRE Business
Selecting an antivirus solution for your organization is an important decision. VIPRE Antivirus Business is a high-performance solution that delivers fast, memory-efficient endpoint security with all the necessary functionality you need and nothing you don't — ensuring an optimal end user performance experience. Read now!

Cloud Growth Prompts Shift in Enterprise Security Strategies
As lower costs drive businesses to use cloud technologies and services more and more, businesses need to rethink their security programs to make sure they take the new architecture into consideration. Read More

Cisco aims for a go-anywhere router
Cisco's new ISR 819 mobile router with GPS is good for use in truck fleets, tollbooths and ATMs, but can also serve as a conventional router in remote offices. Read More

Yale warns 43,000 about 10-month-long data breach
Yale University has notified about 43,000 faculty, staff, students and alumni that their names and Social Security numbers were publicly available via Google search for about 10 months. Read More

Palo Alto PA-5060 is one fast firewall
Palo Alto's new firewall delivered performance 10 times faster than when we tested it in 2008, and came close to its rated capacity of 20Gbps in firewall-only mode, according to Network World's exclusive Clear Choice testing. Read More


WHITE PAPER: IBM

Realize More Business Value
Read the white paper and learn how IBM Tivoli® Security Management for z/OS® can safeguard your business—and deliver rapid ROI. Read Now

Security firms knock heads over Shady RAT hacks
McAfee and Kaspersky labs are butting heads about just how advanced the long-term Shady RAT hacks were, despite the fact that they were effective for a long time. Read More

Stronger IPsec VPN Configurations Needed
Businesses using IPSec need to tune up their configurations to avoid common problems such as poorly executed shared secrets, NAT problems and weak encryption. ... Read More

How the CSA Is Working to Solve Cloud Security Problems
The Cloud Security Alliance doesn't aspire to be a standards body but does look for ways to promote best practices around which users, IT auditors, cloud and security solutions providers can agree. Read More

Future TSA: A booming number of secret watch lists
When the TSA was asked to provide legal reasons that definitely spelled out why physically invasive patdowns are legal, without any probable cause, not one TSA person had an answer. There was no legal documentation for enhanced patdowns other than it serves "the essential administrative purpose." Read More


WEBCAST: Riverbed

What Your Network Isn't Telling You
Are your network tools outdated? This Cascade "chalk talk" shows how to monitor today's network with support for virtualization and cloud and: - Behavioral analytics that learns how your network behaves - Network drill-down to quickly spot root causes of problems - Discovery and dependency mapping of IT assets Learn more!

Facebook data collection under fire in Germany again
A German privacy group is calling for organizations to close their Facebook fan pages and remove "Like" buttons from their websites, arguing that Facebook harvests data in violation of German and European Union law. Read More

The mobile security aspects of VDI
Will virtual desktop infrastructure products and services become a component of the mobile device management MDM market, too? It's possible. Read More

Portland General Electric tries smart security monitoring
Why Portland General Electric deployed Security Information and Event Management (SIEM) technology and what they've been able to accomplish as a result. Read More

Ukraine arrests four in carding scam
Ukraine's security service SBU says it has arrested four people for allegedly creating fake payment cards with stolen information in an operation estimated to have caused $20 million in damages. Read More

Health insurer encrypts all stored data
BlueCross BlueShield of Tennessee, responding to the theft of 57 hard drives in 2009, has completed a $6 million project to encrypt all of its stored data. Read More

Browsing and privacy: How not to get tracked
Computer users who value their privacy are in an ever-escalating battle with Web sites and advertisers over how much information browsers should supply about browsing habits and histories. Read More



GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

SLIDESHOWS

The world's geekiest license plates
This slideshow goes out to all those drivers who aren't afraid to say it loud: I'm a geek and I'm proud. It's filled with images of vanity plates so geeky that they prompted someone else to take a picture and post it on Flickr. Enjoy.

MOST-READ STORIES

  1. The world's geekiest license plates
  2. 21 Chrome Web Apps for Serious Work
  3. Cisco aims for a go-anywhere router
  4. The real 'investment protection' story of the Cisco 6500
  5. Ridiculous FBI list: You might be a domestic terrorist if...
  6. What is a next-generation firewall?
  7. Cisco Announces the Cisco Certified Technician
  8. Palo Alto earns short list status
  9. Top 10 made-in-China iPhone apps
  10. Torvalds says, "Virtualization is evil"

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: