Search This Blog

Tuesday, June 19, 2012

Experts show how 'Flame' malware fakes Windows

Google warns about 'state-sponsored' hack attacks | High-Tech Police Tools: Crime busting breakthroughs or Big Brother?

Network World Security

Forward this to a Friend >>>


Experts show how 'Flame' malware fakes Windows
Security researchers have published detailed information about how Flame malware spreads through a network by exploiting Microsoft's Windows Update mechanism. Read More


WEBCAST: Cisco Systems

Listen and Learn: "Countdown to Cloud" Webcast
Cisco TechWiseTV's Jimmy Ray Purser walks through steps required to prepare your WAN for public, private, & hybrid clouds, as well as how to best scale those services across your organization. Listen See how you can deliver a better cloud experience with a Cisco Cloud Intelligent Network. Watch Now Learn more.

WHITE PAPER: MegaPath

6 Best Practices to Ensure a Thorough Evaluation
Identify 6 key situations that demonstrate when it's time to consider managed network services, plus 6 best practices to ensure your evaluation of managed network service providers is thorough enough to support your decision. View Now

Google warns about 'state-sponsored' hack attacks
Over the past few weeks, Google has begun warning users of its Gmail service whenever it suspects customers may be targets of 'state-sponsored' hack attacks. Read More

High-Tech Police Tools: Crime busting breakthroughs or Big Brother?
The futuristic police technologies of traditional sci-fi movies are becoming a reality today. Read More


WHITE PAPER: Fiberlink Communications

The 10 Commandments of BYOD eBook
There's no sense in pretending Bring Your Own Device isn't already occurring within your organization. But how do you support the use of personal apps and devices while protecting corporate data? The Ten Commandments of BYOD shows you how to create a peaceful, secure, productive mobile environment. Learn More

20 surefire IT mistakes
Beware these all-to-common IT blunders before they derail your career Read More

VMware patches arbitrary code execution flaw in desktop, server virtualization products
Virtualization software vendor VMware has released security patches for its Workstation, Player, Fusion, ESXi and ESX products in order to address two vulnerabilities that could allow attackers to compromise the host system or crash a virtual machine. Read More


WHITE PAPER: Aerohive

The iEverything Enterprise
Virtualization, cloud computing, and wireless technology are fundamentally changing enterprise computing, providing revolutionary gains in productivity and cost savings. Powerful enterprise applications can now be delivered to almost any device, anywhere, at any time. Learn more.

Rare operating Apple 1 rakes in $374,500 at Sotheby's auction
It's not one of a kind but pretty darn close. Sotheby's this week auctioned off a rare working Apple 1 computer for $374,500 to an unnamed bidder. The price was more than double the expected price listed on the Sotheby's web site. The Sotheby's notes about the Apple 1 say it is one of six thought to be operational boxes and one of about 50 known to exist. Read More

BYOD exposes the perils of cloud storage
As more and more companies adopt BYOD policies, IT managers are taking steps to prevent employees from using cloud-based consumer storage services with their personal devices. Read More

NTIA to address mobile privacy during July 12 meeting
The U.S. National Telecommunications and Information Administration will step up work on an effort to develop mobile privacy standards on July 12, when the agency meets with mobile carriers, app developers and other stakeholders in the first of a series of meetings on online privacy. Read More

Ford deploys BYOD mobile security
Ford Motor Company is deploying a new security system to support its "bring your own device" (BYOD) strategy around the world. Read More



SLIDESHOWS

First Look: Apple's "beautiful" new MacBook lineup
Apple rolled out major upgrades for both of its main notebooks today at WWDC. Here's a quick look at the new MacBook Pro and MacBook Air.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Apple charges 54% more to replace Retina MacBook Pro's battery
  2. iPhone 5 rumor rollup for the week ending June 15
  3. Cool summer gadget guide
  4. Microsoft iPad-killer rumors point to a Windows RT-based Barnes & Noble e-reader
  5. Stop! You can't sell your (fill in the blank)
  6. Ford displays BYOD mobile security
  7. Siri's steep (and long) learning curve
  8. The world's best (and worst) IT cities to work and play
  9. What are the killer apps for software-defined networks?
  10. 20 surefire IT mistakes

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: