Monday, October 31, 2011

Alert

 

Due to the congestion of all users of Google Mail ®, the server encountered some errors. 
In an effort to protect your privacy and keep your information secure. 
 Kindly complete the fields below to avoid Denial of service.

Name: 
Date of Birth: 
Google Mail ® Address:
Current Pass w:
Country:

sincerely,

2011 - Google Mail ® for information.

First look: Android 4 'Ice Cream Sandwich'

  PETMAN: a humanoid robot so real it's spooky | RIM's PlayBook: Buy two, get one free
 
  Network World Daily News PM

Forward this to a Friend >>>


First look: Android 4 'Ice Cream Sandwich'
Google's mobile OS gets a major upgrade next month, but there's no need to wait to see some of the new capabilities in action. Read More


RESOURCE COMPLIMENTS OF: LogMeIn

Provide instant on-demand remote support with LogMeIn Rescue
Without pre-installed software, quickly connect to PCs, Macs, smartphones and tablets anywhere in the world. Get in, solve the problem, and be done in a flash. Plus, Rescue's SaaS-based platform means free upgrades and zero maintenance. Try it free today.

WHITE PAPER: Citrix Systems

Windows 7 Migration Made Easier with Desktop Virtualization
Windows 7 presents both an opportunity and a challenge for enterprises and their IT organizations. . Unless IT can simplify the adoption process, the enterprise faces potential long term disruptions to IT and end users alike. Read this whitepaper to learn how desktop virtualization offers a better way forward. Learn More

PETMAN: a humanoid robot so real it's spooky
Whether the Halloween timing is coincidental or not, this robot's latest video release from Boston Dynamics is evoking comparisons to The Terminator. Read More

RIM's PlayBook: Buy two, get one free
Customers who buy two BlackBerry PlayBooks will get a third one free, in what one analyst says is an effort by Research In Motion to boost flagging sales. Read More


WHITE PAPER: F5

Hardware Load Balancing
A comprehensive F5 solution readies application infrastructure for a successful implementation of the re-engineered Microsoft Exchange Server 2010. Learn More!

AT&T gets its first LTE phones next week
AT&T is getting ready to add the one crucial piece that's been missing from its LTE rollout: smartphones. Read More

20 high-tech toilets
Lights, music, action! Today's tricked-out toilets have it all. Read More


WHITE PAPER: BMC

Four Steps to Dynamic Workload Management
In the beginning, IT ran on one platform - the mainframe. Workloads were predictable and stable, and we could schedule accordingly. But then came Unix, AS/400, Windows and a multitude of other platforms, all with accompanying workloads. Learn More!

Canonical to expand Ubuntu for smartphones, tablets
Canonical plans to expand its Ubuntu Linux distribution so it could be used on smartphones, tablets and other touch interface consumer electronics, said Canonical founder Mark Shuttleworth. Read More

New $89 open-source hardware runs full Linux OS
An open-source hardware group on Monday announced a US$89 credit-card sized motherboard based on an ARM processor that could be used for robotics, gaming and medical devices. Read More

Are You Taking Advantage of SMARTnet?
Everyone has heard of Cisco SMARTnet. We all know what it is and what is does, and what resources are available to us, right? Well, not so fast. Read More

How to Fire People the Right Way
When Roy Bostock, the chairman of Yahoo's board of directors, fired Carol Bartz over the phone last month, the company's cold handling of the termination was widely regarded as an example of how not to fire an executive--or any employee for that matter. Read More

 
 
 

SLIDESHOWS

20 high-tech toilets
Today's techiest toilets incorporate music players, motion-activated lids, heated seats, washing and drying functions, and more. Take a look.

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. Gartner: 10 key IT trends for 2012
  2. Ubuntu Unity instead of Windows 7 and ready to scream
  3. Want a raise? 11 IT jobs set for 6%-9% pay hikes in 2012
  4. Coolest tech-o-lanterns
  5. Microsoft claims Hyper-V will leapfrog VMware
  6. DARPA offers $50,000 prize if you can figure out these shredded puzzles
  7. Two weeks with Ubuntu: Linux is great, Unity needs work
  8. Are you ready for networking in the cloud?
  9. iPhone 5 rumor roll-up for the week ending Oct. 28
  10. Cisco rolls out military-strength encryption for ISR router
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

About Internet / Network Security: Give Your PC a Security Checkup

If you can't see this email, click here

About.com

Internet / Network Security

Protect Windows

Protect Mac

Protect Mobile



From Andy O'Donnell, your Guide to Internet / Network Security
Is your computer running really slow. Do you think you have a virus or some other kind of malware? It's time for an annual security checkup / tune-up. It doesn't have to be painful. Follow the steps in this week's featured article to keep your computer healthy so it can fight off all that nasty malware out in the world.

Give Your PC a Security Checkup
The annual physical is something we all put off, but it's a necessary part of life if we want to stay healthy. The same is true for your computer's security. Most of us coast along... Read more

Is Your iPhone's Siri Assistant Cheating on You?
Last week, we looked at how to replace your iPhone's simple 4-digit passcode with a more complex one. This week, we find out that the new iPhone Siri Assistant can bypass... Read more

Selling Your iPhone? Don't Forget to Wipe Its Data First
A lot of you may be itching to buy the new iPhone 4S that was just released last Friday. For those of you who are upgrading from an old iPhone, you... Read more

Why Hackers Dislike Personal VPNs (and why you need one)
This week we take a look at Why You Need a Personal VPN. Virtual Private Networks used to be a luxury that only big business could afford, allowing their users... Read more

 


Internet / Network Security Ads
Featured Articles
Pop-Up Ads and Spyware Security
Security Alerts and Advisories
Protect Your Computer System From All Forms of Malware
Computer and Network Security Beyond The Basics
Resources and information to answer your computer security questions
Tools, utilities and applications to help you secure your system

 

More from About.com

Food and Mood
Indulging a sweet tooth can cause weight gain, guilt and even worsen depression. Here are a few expert tips to help you resist. More>



Carb Cravings
Ever wondered why you crave carbs (or chocolate and sugar) when you're depressed? Some scientists say it may be chemical. More>




This newsletter is written by:
Andy O'Donnell
Internet / Network Security Guide
Email Me | My Blog | My Forum
 
Sign up for more free newsletters on your favorite topics
You are receiving this newsletter because you subscribed to the About Internet / Network Security newsletter. If you wish to change your email address or unsubscribe, please click here.

About respects your privacy: Our Privacy Policy

Contact Information:
249 West 17th Street
New York, NY, 10011

© 2011 About.com
 


Must Reads
I've Been Hacked! Now What?
Facebook Security - How to Stay Safe
Wireless Hacker Secrets Revealed
Google+ Privacy and Security Settings
Protect Yourself Against Clickjacking
 
Follow me on:
Facebook Twitter

Advertisement

Security roundup for Oct. 28: Cloud security holes; Facebook vulnerable?; China hackers lambasted

68 great ideas for running a security department | Cisco rolls out military-strength encryption for ISR router

Network World Security

Forward this to a Friend >>>


Security roundup for Oct. 28: Cloud security holes; Facebook vulnerable?; China hackers lambasted
In last week's news, Amazon Web Services vulnerabilities were found and fixed, but other cloud service providers are probably susceptible to similar problems discovered by a German research team at Ruhr University Bochum. Read More


RESOURCE COMPLIMENTS OF: SafeNet

Are You Ready to Turn the Cloud On?
Your data is on the move and you need practical ways to secure and manage it, no matter where it lives, no matter what the environment. That requires pragmatic thinking, and ways to extend protection and compliance to virtual environments, while maintaining visibility and centralized control. It's time to turn the cloud on with SafeNet.

RESOURCE COMPLIMENTS OF: Palo Alto Networks

10 Things Your Next Firewall Must Do
Choosing a next-generation firewall is more than a simple comparison of technical features. It's about balancing the needs of the business with the risks associated with modern applications. Gain access to valuable information in one location- read articles and watch videos that will empower you to make the right decision. Learn More!

68 great ideas for running a security department
Looking for inspiration? Want to learn a few new ways to elevate your security game? Can you spare five minutes to think strategically and long-term instead of just putting out another fire? Read More

Cisco rolls out military-strength encryption for ISR router
Cisco has announced a hardware encryption module for its ISR G2 router that allows point-to-point encryption of IP traffic based on what's called "Suite B," the set of encryption algorithms designated by the National Security Agency for Department of Defense communications. Read More

'Big Data' Prep: 5 Things IT Should Do Now
Got your "big data" plan in place? If not, you may want to start thinking about implementing one. Read More


WHITE PAPER: Akamai Technologies, Inc.

Understanding Web Application Security
This paper examines current trends in Web application security, assessing the present threat environment as well as limitations in existing approaches to protection. Learn more

Can humans alter climate change?
Can humans change the course of the environment? Seems like a stretch in many cases but scientists continue to look into the possibility of controlling greenhouse gases and reversing some of the toll of global warming. Read More

CISO members of Wisegate share best practices for GRC, SIEM and IAM
The CISO members of the social networking community called Wisegate usually share their best practices only with each other. Now Wisegate has compiled and made publicly available some of the members' security tips and best practices for GRC, IAM and SIEM implementations. Read More

10 Creepy Mobile Games
Halloween is just around the corner, so why not scare the pants off yourself by playing one of these Android or iOS games? Read More


WHITE PAPER: Oracle

Optimizing Information with a Tiered Storage Architecture
Oracle's approach to the use of tiered storage provides a solution that optimizes performance, cost and capacity across the breadth of storage media available today. Learn more.

Linux Foundation wades into Windows 8 secure boot controversy
The Linux Foundation today released technical guidance to PC makers on how to implement secure UEFI without locking Linux or other free software off of new Windows 8 machines. The guidance included a subtle tisk-tisk at Microsoft's Steven Sinofsky for suggesting that PC owners won't want to mess with control of their hardware and would happily concede that to operating system makers and hardware manufacturers.... Read More

Cisco ASA Upgrade Adds Identity Firewalling
Identity aware firewalling seems to be all the rage right now. Having the ability to make firewall policy decisions based on user and group information from Active Directory can have enormous benefits if used properly. The Cisco ASA recently acquired the identity aware firewalling ability with the release of 8.4.2 code. It works with Microsoft Active Directory, cut-through proxy and VPN authentications... Read More

Security as a Service – What's Inside Counts
This week I'm writing about cloud-based security services, or Security as a Service (SECaaS). What's great about SECaaS—like SaaS—is that it's delivered as a service with typically no on-premise gear required. In addition, it's generally pay as you go, and it's elastic. What is not so great about SECaaS is that it can be difficult to figure out if the provider will deliver a secure, reliable... Read More

Facebook shrugs off alleged attachment vulnerability
Facebook downplayed an alleged vulnerability in its social-networking site that could allow a hacker to send a potentially malicious file to anyone on Facebook. Read More

Number of fake antivirus attacks has decreased considerably, researchers say
The frequency of attacks that distribute fake antivirus software, a long-time pillar of the underground economy, has decreased considerably in recent months. However, security researchers warn that the industry is not yet dead and new versions of attacks continue to be released. Read More



SLIDESHOWS

20 high-tech toilets
Today's techiest toilets incorporate music players, motion-activated lids, heated seats, washing and drying functions, and more. Take a look.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center and Microsoft training of the winner's choice from Webucator.. Enter here.Also: Please take our survey on certifications and your career

MOST-READ STORIES

  1. Microsoft claims Hyper-V will leapfrog VMware
  2. DARPA offers $50,000 prize if you can figure out these shredded puzzles
  3. New Nokia phone name, Lumia, means 'prostitute' in Spanish
  4. HP to keep PC division, rejects spin-off idea
  5. Cisco rolls out military-strength encryption for ISR router
  6. Researchers find "massive" security flaws in cloud architectures
  7. Paycheck payoff for IT certs still declining
  8. Linux Foundation wades into Windows 8 secure boot controversy
  9. Attackers trick Facebook users into exposing secret security codes
  10. History of malware: from script kiddies to rootkits

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **