Drive-by-download attack exploits critical vulnerability in Windows Media Player | Massive Android malware op may have infected 5 million users | ||||||||||
Network World Security | ||||||||||
Security roundup: The triumph of hactivists, the sorrow of Symantec WEBCAST: VMware & NetApp Path to Cloud: Virtualizing Business Critical Applications NetApp and VMware experts discuss how customers can virtualize business-critical applications leveraging common resource pools as key elements to delivering IT as a service. Learn More! In this Issue
RESOURCE COMPLIMENTS OF: Palo Alto Networks Gartner Magic Quadrant Exclusive Report Palo Alto Networks was named leader for Enterprise Network Firewalls. According to Gartner, vendors in the leaders quadrant "lead the market in offering new safeguarding features, providing expert capability, rather than treating the firewall as a commodity and having a good track record of avoiding vulnerabilities in their security products." Click to continue Drive-by-download attack exploits critical vulnerability in Windows Media Player Massive Android malware op may have infected 5 million users DARPA takes aim at "Achilles Heel" of advanced computing: Power WEBCAST: VMware & NetApp The Key to Successful Disaster Recovery Paula Fortin of Green Mountain Power explains how disaster recovery of their IT environment, based on VMware and NetApp technology solutions, was rapidly recoverable during Hurricane Irene. View Now! Researchers unearth more Chinese links to defense contractor attacks FTC to scrutinize mobile payment technology CloudPassage launches new security product for public clouds WHITE PAPER: VMware & NetApp Drive IT Efficiency with a Private Cloud Read this success story and find out how NetApp and VMware provided Magna International with a cost-efficient solution. Read Now! How to Prevent Thumb Drive Security Disasters The real reasons why SOPA and PIPA are real bad Threatened by Anonymous, Symantec tells users to pull pcAnywhere's plug | ||||||||||
SLIDESHOWS 2012's 25 Geekiest 25th Anniversaries CISCO SUBNET MOST-READ STORIES
| ||||||||||
Do You Tweet? You are currently subscribed to networkworld_security_alert as security.world@gmail.com. Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy To contact Network World, please send an e-mail to customer_service@nww.com. Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701 ** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. ** |
Everything related to Computer Security - Security Audits, Security Vulnerabilities, Intrusion Detection, Incident Handling, Forensics and Investigation, Information Security Policies, and a whole lot more.
Search This Blog
Monday, January 30, 2012
Security roundup: The triumph of hactivists, the sorrow of Symantec
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment