Search This Blog

Tuesday, March 06, 2012

RSA Conference 2012: Gauging the future for Microsoft’s privacy, security initiatives

Hacker on hacker: Zeus bot master dupes Anonymous backers into installing password stealer | RSA Observations Part I

Network World Security

Forward this to a Friend >>>


RSA Conference 2012: Gauging the future for Microsoft's privacy, security initiatives
At a time when the technology world is facing a fundamental shift in security practices, Microsoft is saying all the right things. Now, with the credibility of a decade's worth of work under its belt, Microsoft is at an opportune position to either bring its work to a new level, or let it slip in pursuit of other objectives. Read More


WHITE PAPER: NetIQ

Streamlining IT Operations with Business Service Management
This IDC Technology Spotlight examines the benefits of a business service management practice and tools in response to IT environments becoming more dynamic and complex due to the increased use of virtualization, cloud, SOA, and n-tier application architectures. Learn More

WHITE PAPER: GFI Software

GFI VIPRE Antivirus Business 5.0
This free fully-functioning 30-day trial of GFI VIPRE Business is designed to optimize overall performance by melding antivirus and antispyware together into one powerful engine. Learn More

Hacker on hacker: Zeus bot master dupes Anonymous backers into installing password stealer
Hackers have duped supporters of the Anonymous group into installing the Zeus botnet, which steals confidential information from PCs, including banking usernames and passwords, security researchers said last week. Read More

RSA Observations Part I
I've been to about a dozen RSA Conferences in my career. Some were really geeky, some were nothing but hype, but last week's event stood out as truly valuable. Yes, marketing rhetoric was in the air as always but under the spin was some truly good dialogue. In the first blog of my RSA review, here are some my observations: Read More


WHITE PAPER: SonicWALL

Smart Security for Escalating Challenges
This eBook examines how CSOs and IT managers are solving these issues using next-generation firewalls. Read now.

The story of the Picasso and a 1.5 ton robot
Spanish telecom firm Telefonica built a robot to digitally image and look for problems with Pablo Picasso's famous 'Guernica' painting Read More

US senator asks FTC to investigate Apple, Google
The U.S. Federal Trade Commission should investigate Apple and Google for allowing applications on their mobile OSes to access users' photographs without permission, a U.S. senator said. Read More


WHITE PAPER: FireEye

Strategies for advanced threat security in 2012
Download this new FireEye research brief and learn how traditional security defenses can leave you vulnerable and necessary steps to gain visibility into all stages of the attack vector. Read now.

Warning: you may be an e-hoarder
Hoarding shows are popular these days. Hoarders, Hoarding: Buried Alive, Confessions: Animal Hoarding and on and on. The images are consistent: Boxes stacked to the ceilings. Piles of newspapers dating back to the Nixon era. Feral cats skittering behind furniture. Empty cans of cat food, beans and soup scattered everywhere. Read More

A look back at the Michelangelo virus scare
After a week-long run-up in which "the media went potty about the Michelangelo virus," March 6, 1992 turned out to be something of a bust, recounts Graham Cluley, senior technology consultant at Sophos. Cluley writes on his Naked Security blog: Read More

Should You Allow Inbound E-mail Over IPv6?
Federal organizations are aiming for September 2012 mandate to IPv6-enable their Internet perimeter applications. This not only includes IPv6-enabling web servers, but also IPv6-enabling e-mail servers. Therefore e-mail servers would be allowing inbound SMTP (TCP port 25) connections over IPv4 and IPv6. However, most e-mail content filtering companies only have defensive capabilities for IPv4. ... Read More

FBI: Cyberattacks could shove aside terrorism as No. 1 threat to US
The leaders of the Department of Defense and the Federal Bureau of Investigation this week separately expressed concern over the increasing numbers of cyberattacks, with FBI Director Robert Mueller saying that while terrorism remains the FBI's top priority, "in the not too distant future, we anticipate that the cyberthreat will pose the No. 1 threat to our country." Read More



SLIDESHOWS

15 worst data breaches
Data security breaches happen daily in too many places at once to keep count. But what constitutes a huge breach versus a small one?

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. iPad 3 pricing to remain the same as the iPad 2
  2. Warning: you may be an e-hoarder
  3. Investment firm warns of delays, performance issues in Juniper products
  4. 15 high-tech wristwatches that would make Dick Tracy jealous
  5. Anonymous supporters victims of Zeus Trojan Horse
  6. Should you allow inbound e-mail over IPv6?
  7. Giving up your iPhone
  8. Siemens launches new VoIP/UC platform
  9. How to catch an Internet cyber thief
  10. The future of end user computing

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: