Search This Blog

Wednesday, June 06, 2012

Hacker v. Hacker: When Egos or Motives Clash, Hackers Attack Each Other

IBM attacks app design to bolster mobile security | Adobe patches critical vulnerabilities in Photoshop and Illustrator CS5.x

Network World Security

Forward this to a Friend >>>


Hacker v. Hacker: When Egos or Motives Clash, Hackers Attack Each Other
Read More


WHITE PAPER: EMC Corporation

Easing the Transition to a Virtual Endpoint Infrastructure
This Technology Spotlight discusses the drivers, benefits, and challenges of creating virtual desktop environments, and looks at the role EMC Global Services plays in helping companies achieve successful deployments of this important technology. Learn More

WHITE PAPER: Fluke Networks

How to Choose a Datacenter OTDR
This white paper helps fiber installers and network technicians understand the key parameters for selecting an OTDR. Choosing the right device not only solves this new generation of datacenter testing requirements, but also helps professionals work efficiently, and increase the reliability and value of the enterprise fiber network. Learn More!

IBM attacks app design to bolster mobile security
The place to start to bolster security in mobile applications is in the development stage. Catch and fix vulnerabilities then and the final product will be more difficult for hackers to penetrate. IBM on Tuesday unveiled software specifically tailored for testing Android apps. Read More

Adobe patches critical vulnerabilities in Photoshop and Illustrator CS5.x
Adobe released several security updates on Monday, addressing nine arbitrary code execution vulnerabilities that affect Adobe Photoshop and Adobe Illustrator CS5.x for Windows and Mac OS X. Read More


WHITE PAPER: Check Point Software

Check Point 3D Security Analysis Report Tool
Reduce security risks with the Check Point 3D Security Analysis tool. This comprehensive security analysis provides an easy-to-read report that summarizes security events, their risks, and remediation. See sample report View Now

INSIDER
The Cisco security directive
Chris Young just celebrated his six-month anniversary as senior vice president of the recently formed Cisco Security Group reporting to Cisco CTO Padmasree Warrior. He brings an interesting perspective to the position, hailing as he does from VMware and RSA. Young was senior vice president and general manager for VMware's end user computing solutions and, prior to that, senior vice president for products at RSA. After hearing Cisco CEO John Chambers proclaim in a recent teleconference that we could expect to see Cisco make big strides in security with Young onboard, Network World Editor in Chief John Dix tracked Young down for his vision and plans. Read More

INSIDER
Next-gen firewalls can handle the heat
In Network World's two-part test, reviewers David Newman and Joel Snyder put next-generation firewalls through the ringer. They found that products could forward packets at an impressive clip but throughput dropped with advanced security features were turned on. Read More


WHITE PAPER: Limelight

Web Acceleration: The Rules Have Changed
Optimizing your web page loading time is essential for retaining your website visitors. Download Web Acceleration: The Rules Have Changed to learn how front-end optimization can improve Time to Action for your web and mobile content, and how it can be done in front of your existing CDN with minimal integration required. Learn More!

Facebook locks in on bounties for security
Can the volunteer White Hats of hacking protect the world's most popular social networking site from the Black Hats? Read More

Researchers reveal how Flame fakes Windows Update
Security researchers today published detailed information about how the Flame cyber-espionage malware spreads through a network by exploiting Microsoft's Windows Update mechanism. Read More

Windows 8's built-in AV to be security of last resort
Microsoft's Windows 8 will activate its built-in antivirus software only if it senses that the PC is not protected by another security program, says McAfee. Read More



SLIDESHOWS

Why the Internet needs IPv6
Explosive growth of Internet users, devices, apps creates demand for more IP addresses.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. 10 most powerful SaaS delivery companies to watch
  2. Asus apologizes over sexist butt tweet
  3. Flame malware's structure among most complex ever seen, says Kaspersky Lab
  4. Could data scientist be your next job?
  5. iPhone 5 rumor rollup for the week ending June 1
  6. Rehearsal is over, IPv6 goes prime time June 6
  7. Emergency Windows patch stops Falme malware from spoofing Microsoft security certificate
  8. Schools need 100Mbps per 1,000 users
  9. Microsoft recalls certificates exploited by Flame malware
  10. Taiwan will end Korean AMOLED screen monopoly this year, says trade group

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: