Search This Blog

Thursday, October 20, 2011

Oracle patches Java flaw exploited in SSL BEAST attack

Gartner: Private clouds are a last resort | Criminals turn to 'card-trapping' at ATM machines to get cash

Network World Security

Forward this to a Friend >>>


Oracle patches Java flaw exploited in SSL BEAST attack
Oracle has released a new Java security update to address multiple vulnerabilities, including one exploited during a recently disclosed attack that can allow eavesdropping on encrypted communications. Read More


RESOURCE COMPLIMENTS OF: Cisco Systems

Context-Aware Security for BYOD Trend
Concerned about the "Bring Your Own Device" (BYOD) trend? Although an "Any Device" environment is becoming essential for today's workplace, new risks and problems may result if your infrastructure isn't ready. Join IDC's Chris Christiansen and Cisco Systems as they discuss security architecture and solutions to address challenges for BYOD. Register Now

WHITE PAPER: Internap

Future-Proofing Your Data Center with Scalable Density
Download this complimentary white paper for a detailed exploration into how scalable density designs can extend the life of your colocation investment and improve the TCO of your colocated solutions and infrastructure. Read now

Gartner: Private clouds are a last resort
Enterprises should consider public cloud services first and turn to private clouds only if the public cloud fails to meet their needs. Read More

Criminals turn to 'card-trapping' at ATM machines to get cash
Criminals are embracing methods to trap debit and credit cards in ATMs for retrieval later, a move believed to be motivated by better security measures designed to ensure card details are not copied at the machines, according to an industry group. Read More


WHITE PAPER: CA Technologies

The Changing Role of IT
This white paper analyzes research conducted by IDG Research Services about the changing role of IT: what's driving the change, what skill-sets will be more valued and what should forward-looking IT executives consider as IT shifts increasingly towards an IT supply chain model. Learn More

NetSuite boosts global capabilities of its SaaS business software
NetSuite on Wednesday announced a series of enhancements and offerings meant to make its on-demand ERP (enterprise resource planning) software more desirable to larger companies, particularly those with international operations. Read More

Gartner: Big challenges lurk in building enterprise wireless networks
ORLANDO - When you start off with this bit of information from Gartner: By 2015, 80% of newly installed wireless networks will be obsolete because of a lack of proper planning - you understand the challenges enterprises face in ramping up mobile environments. Read More


WHITE PAPER: Sybase

Bloor Report: Sybase® IQ 15.3 In Detail
Sybase® IQ is well positioned to compete with traditional and appliance vendors. While it has different advantages in dif¬ferent environments, it merits careful review by organisations investigating data warehousing, high-speed analytics and business intelligence options. Read now.

Researchers discover keyboard keylogger attack via iPhone
A research team from the Georgia Institute of Technology says it has discovered a keyboard keylogger attack that can be done through a compromised Apple iPhone. Read More

Regulators to Web startups: Prioritize privacy protection
Internet companies need to build consumer privacy and data controls into their online services to protect their brands, gain trust from their users, avoid civil lawsuits and prevent government probes, according to two regulators from the U.S. and Canada. Read More



SLIDESHOWS

2011 tech industry graveyard
Fortunately for the tech industry, there's a lot more living than dying, with 2011 seeing the birth of everything from Apple's iPad 2 to the Google+ social network. But inevitably, 2011 has also seen its share of dead, killed, murdered, offed, obliterated companies, technologies and ideas as well. Here's your chance to pay last respects, and who knows, maybe a few of these will sprout back to life.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center and Microsoft training of the winner's choice from Webucator.. Enter here.Also: Please take our survey on certifications and your career

MOST-READ STORIES

  1. Cisco unveils latest Nexus data center switch
  2. Day 1: Giving up Windows 7 for Ubuntu 11.10 for two weeks
  3. Cheap power: An overnight revolution
  4. Gartner: The top 10 strategic technology trends for 2012
  5. Ballmer feels lucky Microsoft didn't buy Yahoo in 2008
  6. Death to firewalls; long live firewalls
  7. Google unveils what's new in Android 4 'Ice Cream Sandwich'
  8. The challenge of managing mountains of information
  9. Researchers discover keyboard keylogger attack via iPhone?
  10. Gartner: Big challenges lurk in building enterprise wireless networks

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: