Search This Blog

Monday, June 18, 2012

Internet Explorer Flaw Triggers Google Nation-State Attack Message

8 no cost/low cost tools for deploying 802.1X security | Rare operating Apple 1 rakes in $374,500 at Sotheby's auction

Network World Security

Forward this to a Friend >>>


Internet Explorer Flaw Triggers Google Nation-State Attack Message
A security flaw in Internet Explorer is triggering messages in some users' Gmail accounts that they may be the target of an attack from a nation-state. Read More


RESOURCE COMPLIMENTS OF: Ipswitch File Transfer

File Sharing — A Security Vulnerability. Are you at risk?
What happens when employees go around IT and use their own Dropbox-like services, webmail or USB drives to send company information? This practice presents significant security and compliance risks including:Loss of control over who has access to files and data, lack of visibility and audit trails, risk of data breaches and compliance violations Join us, on June 19th or June 20th, for a quick 29-minute webinar. Experts Michael Osterman and Ipswitch's David Boone discuss the issues. You'll learn the top 3 things required for a user-acceptable, IT-governed business-class file sharing solution.

WHITE PAPER: Teradata

Cloud Computing Models for Data Warehousing
Gain better business intelligence through private cloud self service capabilities. In this whitepaper, analyst Mark Madsen explores why private cloud computing is a better choice to meet your analytical needs as business conditions fluctuate and grow. Learn more.

8 no cost/low cost tools for deploying 802.1X security
Read More

Rare operating Apple 1 rakes in $374,500 at Sotheby's auction
It's not one of a kind but pretty darn close. Sotheby's this week auctioned off a rare working Apple 1 computer for $374,500 to an unnamed bidder. The price was more than double the expected price listed on the Sotheby's web site. The Sotheby's notes about the Apple 1 say it is one of six thought to be operational boxes and one of about 50 known to exist. Read More

Protests, not criticism, the target for China's Internet censors, study says
China's Internet censors freely allow users in the country to criticize the government, but are quick to delete social media posts with the potential to start protests, suggests a new Harvard University study released on Thursday. Read More


WHITE PAPER: Quest Software

AD Disasters and Solutions for Preventing them
Are you prepared for an Active Directory disaster? If you don't have a solid recovery plan and the right tools, your business will suffer. In this Quest Software white paper, learn about five dreaded Active Directory disasters, and how you can quickly recover from them – or avoid them altogether. Read Now!

Apple and Google Maps: Will eye-in-the-sky 'spy planes' place our privacy at risk?
During the keynote at Apple's 2012 annual Worldwide Developers Conference (WWDC), there was plenty of hype for Mountain Lion and how iOS 6 will support a plethora of 200 new features, but the new Apple Maps app will most likely cause the most privacy concerns. Apple has kicked Google Maps to the curb and is using "military grade-cameras" and "spy planes" which will provide iOS 6 "flyover" mapping.... Read More

Alleged Lulzsec member, Ryan Cleary, indicted in U.S.
A U.S. federal grand jury has indicted Ryan Cleary, a British citizen, accusing him of orchestrating a hacking rampage last year that victimized Sony Pictures Entertainment, Fox Entertainment Group and others. Read More

Facebook, Twitter, Google, AOL join new alliance to fight 'bad ads'
Facebook, Google, Twitter, and AOL have joined an alliance that has been set up to counter "bad ads," including those that deliver malware, direct users to scams, or try to sell counterfeit goods, said StopBadware, the promoters of the alliance. Read More


WHITE PAPER: EMC Corporation

Transforming Tier 1 Applications through Virtualization
This Technology Spotlight will explore the benefits of virtualizing tier 1 applications and discuss the role that EMC Consulting plays in virtualizing top tier Microsoft applications (including Exchange, SharePoint and SQL) on the VMware platform. Learn More

What the Linked breach teaches us about how to safeguard ourselves online
The mammoth security breach that exposed in the neighborhood of 6.5 million LinkedIn user passwords should be a wakeup call for end-users everywhere. We should all practice due dilligence and ask the companies we deal with questions about how they deal with security. Read More

Former tech-challenged Russian spy hits the modeling runway
The red-headed Russian whose spy ring made tech blunder after tech blunder on its way to being summarily deported from the U.S. is now prowling the catwalk at fashion shows. Read More

Ford deploys BYOD mobile security
Ford Motor Company is deploying a new security system to support its "bring your own device" (BYOD) strategy around the world. Read More

Geeky books to get you through the summer
The 2012 Geeky Summer Reading List Read More



SLIDESHOWS

First Look: Apple's "beautiful" new MacBook lineup
Apple rolled out major upgrades for both of its main notebooks today at WWDC. Here's a quick look at the new MacBook Pro and MacBook Air.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Geeky books to get you through the summer
  2. iOS 6: What you need to know
  3. Microsoft customers see benefits of cloud OS; Windows 8, not so much
  4. Banks: Hackers more aggressive in attacking customer accounts
  5. The world's best (and worst) IT cities to work and play
  6. Cisco ends the SDN suspense
  7. Snopes.com debunks old C++ 'interview' hoax
  8. 8 questions that will dominate enterprise cloud adoption
  9. Canonical announces Ubuntu Apps Showdown
  10. Microsoft tries to promote Windows 8 without hurting Windows 7 sales

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: