Search This Blog

Thursday, July 19, 2012

Exploiting Windows: Upcoming Black Hat Briefings

  Microsoft, Juniper, others in coding consortium issue guidelines for safer applications | Victim of half-million-dollar cybercrime tells tale of fighting back
 
  Network World Security

Forward this to a Friend >>>


Exploiting Windows: Upcoming Black Hat Briefings
The upcoming Black Hat presentation 'We have you by the Gadgets' had Microsoft issuing a security advisory. Yet that's not the only attack exploiting Windows that you will be hearing about from hackers' conferences in the coming weeks. Read More


WHITE PAPER: Cisco

Cisco Bring Your Own Device
This paper explores the challenges mobile devices create for IT, offers key considerations before adopting a BYOD strategy and highlights a comprehensive architecture from Cisco that enables freedom of choice for users while affording IT security and control. Learn more.

RESOURCE COMPLIMENTS OF: LogMeIn

Provide instant remote support with LogMeIn Rescue
With LogMeIn Rescue, you can start a support session in just 60 seconds. Connect 24/7 to PCs, Macs, smartphones and tablets. You'll get in, solve the problem and save the day without ever leaving your desk. Try it free today.

Microsoft, Juniper, others in coding consortium issue guidelines for safer applications
An industry consortium dedicated to assuring the security of software has issued guidelines to lower the risk that vulnerabilities that could be exploited by attackers will wind up in finished code. Read More

Victim of half-million-dollar cybercrime tells tale of fighting back
It started out as an ordinary workday for Michelle Marsico, but when she went online to check the funds-transfer activity in her commercial bank account, she found to her horror that it had been cleaned out by cybercrooks to the tune of almost half a million dollars. Read More


WHITE PAPER: McAfee

Risk and Compliance Outlook Report 2012
McAfee retained Evalueserve to conduct an independent assessment of the factors organizations that use risk and compliance products face in 2012. Learn more.

Android malware steals location data from mobile devices
BitDefender Labs has discovered Android malware that regularly broadcasts the location of the infected mobile device to a remote server. Read More

Firefox 14 contains vulnerability patches, security-related features
Version 14 of the Mozilla Firefox browser offers several new security-related features as well as patches for numerous vulnerabilities. Read More


WHITE PAPER: Xirrus

Tablets in the Enterprise
Tablets are replacing laptops at lightning speed. Whether company-issued or part of the BYOD phenomenon, the increased use of smart devices has resulted in a dramatic shift in network traffic with an emphasis on wireless. This paper explains how to predict Wi-Fi demands and architect a best-fit wireless network strategy for your environment. Learn more.

Dropbox brings in outside team to investigate spam run
Dropbox is investigating reports that some European users are receiving spam asking them to email addresses associated with their accounts, the company said. Read More

Are Firewalls Dead?
Is your firewall doing anything for your security? With so many of today's attacks coming over port 80, is your firewall providing any defense anymore? Has the firewall outgrown its usefulness and been passed over by a new generation of sophisticated attacks? Read More

 
 
 

SLIDESHOWS

9 itsy-bitsy, teeny-weenie computers
Here are eight products, and a project in development, that are leading the effort to make PCs small enough to slip into your pocket.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Earliest known photos of an Apple iPad prototype
  2. Victim of half-million-dollar cybercrime tells tale of fighting back
  3. NSA whistleblower Drake: You're automatically suspicious until proven otherwise
  4. Williams vs. DiMaggio online slugfest sets Postal Service record
  5. BYOD early adopters cite sticker shock
  6. HOPE 9: Whistleblower Binney says the NSA has dossiers on nearly every U.S. citizen
  7. Raspberry Pi flies off shelves as mass orders roll in
  8. Java developer most difficult tech job to fill: survey
  9. Gartner: cloud putting crimp in traditional software, hardware sales
  10. 'Not cool, guys' -- Torvalds bemoans size of RC7 for Linux kernel Version 3.5
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: