Wednesday, May 30, 2012

Consumer Reports: Free anti-malware software for Windows, Mac is effective

Network World Security - Newsletter - networkworld.com
NSA security expert worries about mobility, cloud | Give Cyber Peace a Chance…But It Still Won't Work

Network World Security

Forward this to a Friend >>>


Consumer Reports: Free anti-malware software for Windows, Mac is effective
In what could be regarded as a controversial test of anti-malware effectiveness, the influential Consumer Reports publication in its June issue gives its main recommendation to anti-malware freeware for protecting Windows and Mac computers. With some caveats, Consumer Reports says in its "Security Software" article it regards it as unnecessary to buy commercial anti-malware software. Read More


WHITE PAPER: Fortinet

Next-Generation Security for Enterprise Networks
Since the concept of a 'next-generation firewall' was introduced several years ago by Gartner, many network security vendors have introduced their own next-generation firewalls to address this product category - but with varying results. View Now

RESOURCE COMPLIMENTS OF: IT Roadmap Denver

Your IT Career Roadmap
This unique session is designed with you, the IT professional in mind. How can you build your personal brand, and properly design a career plan? How do you work with your staff to create a plan that retains your best talent? Come to IT Roadmap Denver for valuable information on how today's IT leaders build successful careers. Click to continue

NSA security expert worries about mobility, cloud
Approaching its 60th birthday, the National Security Agency (NSA) has a staff some 35,000 strong worldwide, and an impressive building complex in Fort Meade, Md., where the walls are lined with copper mesh to prevent electronic eavesdropping. True to its origins dating back to breaking enemy code during World War II, the agency has two primary missions: signals Intelligence (SIGINT) and information assurance (IA). Read More

Give Cyber Peace a Chance…But It Still Won't Work
Cybersecurity guru Eugene Kaspersky has called for an international cyber-weapons treaty because, he says, there's is no feasible way to defend all of our critical network infrastructure against cyber attacks. His reason sounds like a good one. Unfortunately, it won't work, according to CIO.com blogger Constantine von Hoffman. Here's why. Read More


WHITE PAPER: Dell

Managing Data Growth
Small and midsize businesses can get the storage strategy advice they need in this issue of "Data Storage Insights." With a focus on managing data growth, expert articles include how tiered storage saves, tips to cost-effectively expand storage capacity and what to do once your business has outgrown its backup strategy. Learn More

Cool space shot: Venus set to cross Sun
You likely have been told your entire life not to stare directly at the but for an event happening next month you may want to figure out how to get a peek. NASA said on June 5th, 2012, Venus will pass in front of the sun, "producing a silhouette that no one alive today will likely see again." RELATED: The sizzling world of asteroids Read More

Romanian authorities dismantle hacker group targeting government websites
Twelve individuals were detained by Romanian authorities on Tuesday, suspected of being members of a cybercriminal group that hacked into the websites of various Romanian and foreign public institutions and government agencies. Read More


WHITE PAPER: IBM

Leveraging Emerging Technologies for Business Intelligence
This whitepaper addresses how Instead of storing data in a data warehouse, in-memory analytics stores the data set in memory, allowing for dramatic improvements in query response and the end-user experience. Learn More

New Federal Mobile IT Strategy Must Address Security
As the White House rolls out an agenda to open and optimize government data for mobile devices and accelerate use of smartphones and tablets across departments and agencies, security expert warns that federal CIOs must address an array of vulnerabilities. Read More

Google to face fresh ICO scrutiny over WiFi snooping
Google's conduct over the notorious "WiSpy" incident is facing fresh scrutiny from the Information Commissioner's Office (ICO), following the publication of a report by its US counterpart the Federal Communications Commission (FCC). Read More

Yahoo leaks private key, allows anyone to build Yahoo-signed Chrome extensions
Yahoo was forced to release a new version of its Axis extension for Google Chrome after the original one contained a private key that allowed anyone to digitally sign extensions in Yahoo's name. Read More



SLIDESHOWS

10 terrific LTE smartphones for $150 or less
LTE on the cheap: Offerings from Apple, Samsung, Nokia and more make cut.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. iPhone 5 rumor rollup for the week ending May 25
  2. Cisco all but kills Cius tablet computer
  3. RIM said to plan to lay off 2,000 staff
  4. Gartner: Don't trust cloud provider to protect your corporate assets
  5. Researchers identify Stuxnet-like cyberespionage malware called 'Flame'
  6. Extreme BYOD: When consumer tech goes to unexpected places
  7. Gearhead: Hardware we want to get our hands on
  8. Sales of unused IPv4 addresses gathering steam
  9. Cisco takes its lumps, keeps developing video meeting tools
  10. Patch management still big stumbling block in risk management, survey shows

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment