Thursday, January 12, 2012

Can you trust data-recovery service providers?

  Public attack code aimed at Windows Web servers works, says Symantec | Cybersecurity help exists, focusing it is the trick
 
  Network World Security

Forward this to a Friend >>>


Can you trust data-recovery service providers?
Data-recovery service providers are supposed to be saving important data for you when something goes wrong -- a drive crashes or storage device is dropped, and no backup is available. But do you trust them with the important data you let them recover or could they actually be a source for a data breach? Read More


WHITE PAPER: Splice Communications

Offloading Telecom Delivers a Big Payback for IT
Inaccurate invoices, complicated contracts, slow provisioning and poor support from Telecom carriers wastes time, money and resources. Learn the difference a custom data network solutions provider can deliver. Read Now!

WHITE PAPER: Quantum

Big Data: Managing Explosive Growth
Are you experiencing a data explosion? The trend toward leveraging Big Data for competitive advantage helps IT professionals successfully meet business goals. Learn how to reliably manage, store and access vast amounts of archived data while protecting it and keeping costs low. View Now

Public attack code aimed at Windows Web servers works, says Symantec
Researchers at Symantec yesterday confirmed that working attack code published Jan. 6 can cripple Web servers running Microsoft's ASP .Net. Read More

Cybersecurity help exists, focusing it is the trick
There are a ton of groups out there that offer cybersecurty help and guidance, the trick, it seems is finding he right one for you organization. Read More


WEBCAST: NetIQ

Disaster Recovery Planning and the Cloud
Find out how virtualization is the stepping stone to the cloud and how to leverage virtualization technologies today to reduce the cost and improve the performance of your disaster recovery plan. Learn More!

Who's flying drones in U.S.? ... EFF sues government to find out
Most of us think of drones in the military context - they're being used over there to watch and kill enemy combatants - and, collaterally, innocent civilians. Your opinion of their use likely dovetails with your opinion of the wars. Read More

10 game-changing space galaxy discoveries
A massive amount of new astronomical research and discoveries have been shown at the 219th meeting of the American Astronomical Society recently. While the new information covers a variety of areas from supernova explosions to dark matter, research on galaxies has been one of the hottest topic areas. Here we take a look at 10 of the biggest galaxy research images presented at the meeting. Read More


WHITE PAPER: Oracle

Disaster Recovery for Oracle Exalogic Elastic Cloud
Oracle Maximum Availability Architecture (MAA) is the Oracle best practices blueprint for implementing Oracle high availability technologies and is one of the key requirements for any Oracle Fusion Middleware enterprise deployment. Learn more in this whitepaper about the various components of MAA and what this exceptional product can do for you. Learn More!

Carrier IQ detection tool converted to premium SMS Trojan
Android malware writers are taking advantage of the controversy surrounding Carrier IQ's smartphone tracking software in order to distribute a premium SMS Trojan, security researchers from Symantec warn. Read More

Lawsuit claims Symantec sells scareware-like products
Symantec has been accused in a lawsuit of California's unfair competition laws and fraudulent inducement by using scareware-like tactics to trick users into buying licenses for its PC utility-type products. Read More

CES: Analysts predict the future of technology
At least one panel discussion here is focused not on what people can buy now, but what they will be able to buy at CES in the future, at least 10 or more years out. Read More

Adobe plugs 6 critical holes in Reader
Adobe on Tuesday patched six vulnerabilities in the newest version of its popular Reader PDF viewer, making good on a late-2011 promise when it shipped an emergency update for an older edition. Read More

 
 
 

SLIDESHOWS

CES 2012 ultrabooks and tablets
Ultrabooks! Ultrabooks! That's the official biggest buzzword for this year's Consumer Electronics Show in Las Vegas. Ultrabooks! In honor of these purportedly magical super-thin laptops, we've decided to make a compilation of some of the ultrabooks you'll see at CES next week. And for good measure, we've thrown in a tablet that will garner a lot of attention as well. Enjoy!

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. CES: Gigabit Wi-Fi takes center stage
  2. IPhone 5 rumor rollup for the week ending Dec. 31
  3. 5 reasons Linux Mint is better than Ubuntu
  4. Cisco cranks up Internet TV volume at CES
  5. 4 sweet smartphones from CES 2012
  6. The skinniest, thinnest, most emaciated products of CES 2012
  7. Cisco gains SAN share as Brocade looks for buyer
  8. Father's attempt at parental control resulted in hacked German police system
  9. Will Microsoft's WiFi-NC set new network standard?
  10. Financial services firms try to scrimp on IT pay
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment