Thursday, September 27, 2012

20 security and privacy apps for Androids and iPhones

  How to encrypt your cloud storage for free | Sophos rolls out mobile apps for anti-malware and encryption
 
  Network World Security

Forward this to a Friend >>>


20 security and privacy apps for Androids and iPhones
Encrypted storage, malware scanners, missing-phone-finders and more: Here are 20 apps to help protect your smartphone, your privacy and your data. Read More


RESOURCE COMPLIMENTS OF: Google

Google Apps for Business
Do more for less with your team using Google Apps. Custom web-based email, calendars, and documents to easily share & work together in the cloud. Start with a free 30-day trial!

WHITE PAPER: Sourcefire, Inc.

The Sourcefire FireAMP Vision
Still getting malware infections despite the time and money you've spent on security? Today's malware defenses have an inherent disadvantage in fighting today's threats. Designed for another time they are burdened with legacy constraints that hamper performance and protection. Learn More

How to encrypt your cloud storage for free
If you want something done right, you need to do it yourself. That may sound like a trite cliche, but the maxim rings true when it comes to securing files that you've stored online: A handful of recent incidents--including breaches of Dropbox and iCloud--underscores the fact that even with built-in encryption and SSL transfers, cloud storage providers can't perfectly ensure the sanctity of your data. Read More

Sophos rolls out mobile apps for anti-malware and encryption
Sophos today announced a free anti-virus defense app for Google Android devices which works via the Sophos cloud-based service. Separately Sophos also made available Android and Apple iOS apps for securing files held in the cloud file-storage service Dropbox. Read More

Banks can only hope for the best with DDoS attacks
As with Tuesday's attack on Wells Fargo, distributed denial of service attacks are said to be still crude but effective Read More

Assange claims US erecting a regime of secrecy and obfuscation
The U.S. is trying to erect a national regime of secrecy and obfuscation where any government employee revealing sensitive information to a media organization can be sentenced to death, life imprisonment, or for espionage, and the journalists from a media organization with them, WikiLeaks founder Julian Assange told a U.N. forum through a video link from the Ecuador embassy in London on Wednesday. Read More


WHITE PAPER: Ipswitch File Transfer

Selecting a Secure, Managed File Transfer Solution
Are you considering a secure, managed file transfer solution? This in-depth resource shares best practices, checklists and worksheets in evaluating solutions including requirements around security, high availability, workflow, programmability, protocol and operations. Learn More.

Islamic hacktivists' bank hacking claims gain credibility
The denial of service attack that disrupted the Wells Fargo & Co. electronic banking operations Tuesday was the fourth since last week. And it appears to lend some credence to threats and claims posted on Pastebin that the Izz al-Din al-Qassam Cyber Fighters, the military wing of Hamas, the Islamic party that governs the Gaza Strip, are behind them. Read More

Air Force sets first post in ambitious Space Fence project
The US Air Force this week said it will base the first Space Fence radar post on Kwajalein Island in the Republic of the Marshall Islands with the site planned to be operational by 2017. Read More

An iPad stand, a WiFi access point, and a honeypot
I've checked out many iPad stands over the last few months and I just found what I think is one of the very best: The Uprise 360 produced by Hub Innovations. This is a dead simple design which your iPad (version 2 or 3) snaps into and you can rotate it to portrait or landscape as required. It's easy to remove the iPad when you need to and that's it ... as I said, it's dead simple and does the job. For $39.95 the Uprise 360 produced by Hub Innovations Uprise 360 gets a Gearhead rating of 5 out of 5. Read More

Does anyone want to volunteer their private security information?
It has been almost 10 years since FISMA was enacted, the last major federal law to focus primarily on information security. Even then, the scope of FISMA was limited to federal government agencies and selected contractors. Read More


WEBCAST: VMware

10 Reasons to Modernize the Desktop
his paper illustrates the benefits of moving beyond the physical PC to a modern desktop that is highly flexible, easy to manage, customizable to suit users' needs, and ready for new and future technology. Read Now!

Mobile malware up 2,180% in security scare
Loss, theft, spam, Trojans, spyware, data breach, and aggressive advertising are some of the threats facing vulnerable mobile devices, such as smartphones and tablets. Read More

Questions to ask your cloud disaster recovery provider
Disaster recovery as a service (DRaaS) is a blossoming area of DR and cloud computing. But because it's in its early days, many customers may not know exactly what to look for when shopping around. Read More

5 Mobile Security Lessons From the Department of Defense
Several years ago, the National Security Administration wasted millions on a circuit-switched approach to mobile security strategy. With help from the Department of Defense, the NSA is doing things differently now. Enterprise CIOs can learn a few things from the effort, too. Read More

10 (FREE!) Microsoft tools to make life easier
Tools that secure, automate, pinch pennies - including some for Windows 8 Read More

 
 
 

SLIDESHOWS

15 more useful Cisco sites
Another lineup in our continuing search for the most useful sites on the Web for Cisco users and practitioners.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Torvalds calls Romney 'a f***ing moron'
  2. Cisco CEO Chambers hints at retirement
  3. 'Replacement Google' mocks NFL's replacement refs
  4. 11 (free!) Microsoft tools to make life easier
  5. iOS 6 device users report baffling range of Wi-Fi problems
  6. 15 more useful Cisco sites
  7. Six free Cisco Labs
  8. Time to disable Java again: 1 billion at risk from newest critical Java bug
  9. 12 free cloud storage options
  10. Windows 8 is a must-win gamble by Microsoft
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment