Search This Blog

Wednesday, March 07, 2012

Which Android Security Tools Are Worth Your Time?

Is it really Zeus vs. Anonymous? | New DARPA challenge wants unique algorithms for space applications

Network World Security

Forward this to a Friend >>>


Which Android Security Tools Are Worth Your Time?
As Android smartphones and tablets grow in popularity, it's no surprise that the number of malware outbreaks is growing. Mobile antimalware apps can give your phone or tablet an extra layer of protection--but which ones do the job? Independent security testing lab AV-Test evaluated 41 virus scanners for Android, including those by mainstream security companies like Norton and Trend Micro. AV-Test used the Android emulator built into the Android SDK and ran each of the apps through a series of malware detection tests. To ensure that everything lined up, all the results from the emulator were tested on a real device. Read More


WHITE PAPER: Tripwire

Responding to New Threats in More Complex IT Environments
As organizations today face the challenge of protecting their valuable data, they must balance that protection with giving business users and customers access to the data. Learn More!

RESOURCE COMPLIMENTS OF: Citrix

Ready for 2048-bit SSL? Not with F5.
The Iron Age is officially over. The Cloud Age is here. Don't let stronger security compromise performance. NetScaler gives your network a competitive edge with the industry best 2048-bit SSL transaction/sec performance. 2x faster SSL performance than F5. 50% lower SSL costs. Download the Citrix and Verisign White Paper and the NetScaler vs. F5 Performance Comparison now.

Is it really Zeus vs. Anonymous?
Were Anonymous supporters really duped into installing the Zeus botnet that steals their confidential information, including email login information, banking user names and passwords? Symantec says yes. Read More

New DARPA challenge wants unique algorithms for space applications
On March 28, the Defense Advanced Research Projects Agency will kick of another one of its highly successful challenges this time looking for teams or individuals to develop unique algorithms to control small satellites on-board the Read More

How security can add value to DevOps
Gene Kim, award-winning entrepreneur, researcher and founder of security firm Tripwire, walks us through his vision. Read More

Extreme Networks takes on BYOD challenge
Extreme Networks this week is rolling out Ethernet switches and a network management application designed to address the BYOD phenomenon at enterprise campuses. Read More


WHITE PAPER: SonicWALL

Smart Security for Escalating Challenges
This eBook examines how CSOs and IT managers are solving these issues using next-generation firewalls. Read now.

Anonymous supporters tricked into installing Zeus Trojan
Thousands of Internet users downloading the Slowloris tool to participate in recent DoS attacks in support of the Anonymous protest movement could have infected themselves with the Zeus banking Trojan, Symantec has reported. Read More

Alleged members of hactivist group LulzSec busted
The FBI and law enforcement counterparts abroad have arrested members of the LulzSec hacker group now affiliated with the broader hactivist collective Anonymous, according to news reports that also say LulzSec leader "Sabu" turned in his fellow hackers. Read More

US files papers for Megaupload founder Kim Dotcom's extradition
U.S. prosecutors have filed papers seeking the extradition of Kim Dotcom, founder of Megaupload and three colleagues, who are charged in the U.S. with allegedly running a criminal enterprise responsible for online piracy of numerous types of copyrighted works. Read More

Judge extends DNS Changer deadline as malware cleanup progresses
A federal judge yesterday extended an operation that will keep hundreds of thousands of users infected with the "DNS Changer" malware connected to the Internet until they can scrub their machines. Read More


WHITE PAPER: FireEye

FireEye Advanced Threat Report – 2H2011
This report is unique in that it is not an analysis of well-known malware or billions of spam messages. Instead, we provide insight into the threats that are successful and therefore dangerous -- those which got through traditional defenses and into enterprise networks in 2H 2011. Read now.

Google patches 14 Chrome bugs, pays record $47K in bounties and bonuses
Google yesterday patched 14 vulnerabilities in Chrome and handed out a record $47,500 in rewards to researchers, including $30,000 for "sustained, extraordinary" contributions to its bug-reporting program. Read More

A $500,000 bet on Internet security
Longtime cloud security advocate Philippe Courtot believes he has identified the Achilles' heel of cloud security, and he wants to protect it. Read More

Adobe patches Flash Player for second time in 20 days
Adobe today patched a pair of critical vulnerabilities in Flash Player and told IT administrators to apply the update within 30 days. Read More

A Fast and Secure Web Proxy for Corporate Users
Here's how to create a simple, secure proxy server for your enterprise using Squid, ClamAV, and other open source applications. Read More

The story of the Picasso and a 1.5 ton robot
Spanish telecom firm Telefonica built a robot to digitally image and look for problems with Pablo Picasso's famous 'Guernica' painting Read More

Windows Server 8: Ten Features Managers Will Love
These new and improved features in Windows Server 8 will make many Windows administrators very happy. Read More



SLIDESHOWS

15 worst data breaches
Data security breaches happen daily in too many places at once to keep count. But what constitutes a huge breach versus a small one?

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. If the 'ridiculous' Dow had chosen Apple instead of Cisco
  2. iPhone 5 rumor rollup for the week ending March 2
  3. iPad HD - What Apple's calling its next-gen tablet
  4. 'Big data' creating big career opportunities for IT pros
  5. A $500,000 bet on Internet security
  6. Intel's Romley products could put crimp in competition
  7. Warning: you may be an e-hoarder
  8. Study: Cloud will create 14 million jobs by 2014
  9. iPad 3 could blow away competitors
  10. 15 awesome Windows 8 'Metro-Style' apps

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: