Search This Blog

Thursday, December 15, 2011

Microsoft dissecting Windows Phone messaging bug

The weirdest, wackiest and coolest sci/tech stories of 2011 | Cybersecurity demands an ounce of prevention and a pound of cure

Network World Security

Forward this to a Friend >>>


Microsoft dissecting Windows Phone messaging bug
Microsoft Windows Phone engineers are reviewing a report that various messaging technologies can be used to send the phone into a reboot and then freeze its messaging center, or hub. Read More


ARTICLE: Kaspersky Labs

What does 'Be Ready for What's Next' Really Mean?
Cloud. Mobile. Consumerization. Virtualization. Your business is changing fast, bringing new and unprecedented IT security risks. Join Kaspersky Lab's Senior Director of Product Marketing, Peter Beardmore, and Chris Christiansen, IDC's top IT security analyst, for a live webinar providing insights into the key threats to organizations. Lean More.

WHITE PAPER: FireEye

Attacks get through 95% of networks
Advanced Malware Exposed is a 20+ page ebook providing a broad overview on the major aspects of advanced malware, its underpinnings, its impact on modern business practices, and briefly suggests possible solutions. Read now!

The weirdest, wackiest and coolest sci/tech stories of 2011
This year we find horses helping to build the Internet, Apple having all the money in the world and way more wackiness Read More

Cybersecurity demands an ounce of prevention and a pound of cure
What's the best way to protect against security incidents? Most security professionals would agree with the old colloquialism that, "an ounce of prevention is worth a pound of cure." The theory here is that if you lock down your IT infrastructure, applications, and sensitive data, you'll make it much harder for bad guys from the start. Read More


WEBCAST: ForeScout Technologies

CISO in the Know - Mitigating Modern Attacks
This webcast examines sophisticated and targeted threats, security gaps, techniques and new technologies with regards to understanding and defending against zero-day threats, propagating worms, low-and-slow attacks and advanced persistent threats (APT). Learn more.

Industrial espionage gang sends malicious emails in security vendor's name
A cybercrime gang that primarily targets companies from the chemical industry has launched a new series of attacks that involve malware-laden emails purporting to be from Symantec, the security vendor responsible for exposing its operation earlier this year. Read More

Google ships Chrome 16, patches 15 vulnerabilities
Google yesterday patched 15 vulnerabilities in Chrome, paying $6,000 in bounties to bug hunters who reported some of them, and updated the browser to version 16. Read More


WHITE PAPER: NetIQ

First Industy-Wide BSM Maturity Benchmark Study
This first-of-its-kind benchmark study reporting the IT and Business maturity illustrating the business service management imperative today. The survey offers insight into the current and future state of the Business Service Management imperative across global organizations. Learn More

Best and worst celebrity technology moments of 2011
Scarlett Johansson, Justin Bieber, Charlie Sheen, Lady Gaga and Alec Baldwin all make tech news, voluntarily or not Read More

Microsoft scratches BEAST patch at last minute, but fixes Duqu bug
Microsoft today issued 13 security updates, one less than expected, that patched 19 vulnerabilities in Windows, Internet Explorerr, Office, and Windows Media Player. Read More

15 top quotes of 2011
As another year draws to a close, we look back on the IT-related comments that stuck with us. Read More



SLIDESHOWS

8 Free Wi-Fi security tools
Here are several free programs you can use to do Wi-Fi stumbling and surveying on all the popular platforms - Windows, Mac OS X, and Linux. You'll be able see all the nearby wireless access points (APs) and their details, including channels, signal levels, and MAC address.

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. Googler's LAN-party house sparks awe and envy
  2. 2012 looking ripe for disgruntled IT pros to switch jobs
  3. Killer resumes for techies
  4. LAN-party house guy spills important cost details
  5. 7 free Siri alternatives for Android
  6. Surveillance industry objects to spying secrets & mass monitoring leaks
  7. Google prepping Siri killer dubbed Majel
  8. Start-up founded by ex-Cisco execs pushes SDN
  9. What's next with hypervisors?
  10. 8 free Wi-Fi security tools

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: