Search This Blog

Thursday, September 06, 2012

Android: Everyone's favorite new malware target

Did AntiSec snag Apple UDID list from FBI laptop via Java 0day exploit? | The Security Skills Shortage Impact on Security Services

Network World Security

Forward this to a Friend >>>


Android: Everyone's favorite new malware target
Year-over-year smartphones exploits have exploded. McAfee released its Threats Report for the second quarter of 2012 [PDF] today, reporting dramatic year-over-year growth of mobile malware and citing Android as the favored target of black hat mobile hackers. Read More


RESOURCE COMPLIMENTS OF: Google

Google Apps for Business
Do more for less with your team using Google Apps. Custom web-based email, calendars, and documents to easily share & work together in the cloud. Start with a free 30-day trial!

WHITE PAPER: Dell and VMware

Cloud Control: Meet the Challenges Head-On
Looking for the "On" switch for your cloud computing deployment? Right. While Cloud Computing is the gateway to business flexibility and agility, there's no "On" switch. There's no "right" way. The benefits of cloud hold tremendous promise, and challenges abound. Learn More

Did AntiSec snag Apple UDID list from FBI laptop via Java 0day exploit?
Is the FBI tracking 12,367,232 Apple device users? It is according to AntiSec hackers who allegedly snagged the Apple device ID list from an FBI computer and then dumped the redacted digital dirt on one million to prove it. Read More

The Security Skills Shortage Impact on Security Services
According to ESG Research, 55% of enterprise organizations (i.e. those with more than 1,000 employees) plan to hire additional security professionals in 2012 but they are extremely hard to find. In fact, 83% of enterprises claim that it is "extremely difficult" or "somewhat difficult" to recruit and/or hire security professionals in the current market. Read More

P2P blocklists fail to protect privacy from copyright cops' mass monitoring
Have you downloaded any pirated movies, music or eBooks via a BitTorrent client lately? If yes, then you probably had your IP address logged by copyright cops within three hours of joining a swarm. Opting not hide your IP behind a VPN or proxy, and instead opting to use P2P blocklists don't offer file-sharers much protection from the "massive monitoring" activities by anti-piracy groups. Read More


WHITE PAPER: McAfee

What's Holding Back the Cloud?
This report captures key findings from a blind survey of 800 IT professionals in four countries — China, Germany, the United Kingdom and the United States — that provide insight into cloud computing security concerns, and how those concerns might be alleviated. Learn more in the McAfee Securing Cloud-Based Services KnowledgeVault. Learn more.

12 hot cloud computing companies worth watching
While big-name players such as Amazon, Google, IBM, Verizon and VMware sit atop the burgeoning cloud computing market, an entire ecosystem of early stage startups are looking to stake their claim, too. Read More

Does a Cyber-9/11 Loom?
The longer Congress waits to gets its act together on cybersecurity, the longer the U.S. remains at risk of an attack by spies, terrorists, hackers or companies representing themselves or an entire rogue nation. Can Washington rise to the challenge without crushing civil liberties? Read More

FBI denies it was source of leaked Apple device ID data
The FBI denied that the 1 million unique device identifiers for Apple devices posted publicly by hacker group AntiSec on Monday had come from its computers. Read More


WHITE PAPER: IBM

How to Justify the Cost of a TMS
Read this white paper to learn how implementing a service-based TMS, together with a well designed freight audit and payment module help reduce your transportation spend. Learn More

How BYOD has changed the IT landscape
It may be hard for some to just say 'no' to the growing "Bring Your Own Device" (BYOD) crowd, but that was the initial reaction manager of information at certified public accounting firm Burr, Pilger, Mayer Anthony Peters had when senior executives starting purchasing iPhones, asking them to be supported. Read More

Banking execs won't find prison nearly as easy to scam as their ATM racket
Two executives at a company that owned and dispensed ATM machines have been sent to jail for defrauding the Domestic Bank of Cranston, Rhode Island of about $4.8 million. Read More

BitCoin exchange loses $250,0000 after unencrypted keys stolen
Hackers stole about US$250,000 from BitFloor, a BitCoin exchange, on Monday, and it does not have the money to reimburse account holders, according to the website's founder. Read More



SLIDESHOWS

Tech CEOs' first jobs: Licorice maker, housekeeper, scuba diver and more
Before their corporate jobs, many tech CEOs got their hands dirty, scrubbing oils stains off asphalt, cleaning bathrooms, and shoveling monkey cages. Here are their stories.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. iPhone 5 to be unveiled on Sept. 12
  2. 5 things we love/hate about Linux Mint 13 (Maya)
  3. Apple vs. Samsung: innovation vs. clones
  4. McAfee: New malware is proliferating
  5. How to find out if your iPhone or iPad UDID has been compromised
  6. Linux Mint 13 leaves sour aftertaste
  7. Back from EDGE - a look at the evolution of the iPhone
  8. Most wild, wacky & wonderful Wi-Fi installations
  9. How to securely erase your hard drive
  10. Big smartphone, tablet news expected from Nokia, Motorola, Amazon and Apple

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: