Search This Blog

Monday, September 17, 2012

Microsoft takes down another botnet, Nitol

  Google adds support for do-not-track in latest version of Chrome | How to Block Annoying Political Posts on Facebook
 
  Network World Security

Forward this to a Friend >>>


Microsoft takes down another botnet, Nitol
For the fifth time in three years Microsoft has stepped in to take down a botnet, this time malware called Nitol that was infecting new machines bought in China. Read More


RESOURCE COMPLIMENTS OF: Google

Google Apps for Business
Do more for less with your team using Google Apps. Custom web-based email, calendars, and documents to easily share & work together in the cloud. Start with a free 30-day trial!

WHITE PAPER: Sourcefire, Inc.

The Sourcefire FireAMP Vision
Still getting malware infections despite the time and money you've spent on security? Today's malware defenses have an inherent disadvantage in fighting today's threats. Designed for another time they are burdened with legacy constraints that hamper performance and protection. Learn More

Google adds support for do-not-track in latest version of Chrome
Google Chrome will soon provide users with the option to use the do-not-track setting when browsing the Web, effectively allowing them to opt out of many website ad targeting systems. Read More

How to Block Annoying Political Posts on Facebook
Tired of the political flame wars that pop up in your Facebook News Feed? Here's a Google Chrome extension that deletes them from sight. Read More


WEBCAST: Webroot Software

Try the fastest business security ever.
Online security is an increasing risk for businesses, but what is the best solution? Cloud-based SaaS security is an emerging trend for organizations looking to address today's security reality. Learn about the cloud-based SaaS security. Learn More.

'CRIME' attack abuses SSL/TLS data compression feature to hijack HTTPS sessions
The 'CRIME' attack announced last week exploits the data compression scheme used by the TLS (Transport Layer Security) and SPDY protocols to decrypt user authentication cookies from HTTPS (HTTP Secure) traffic, one of the attack's creators confirmed Thursday. Read More

China's Huawei and ZTE grilled by U.S. committee over spying concerns
A U.S. congressional committee appeared to come away still in doubt about the security of networking equipment from Chinese firms Huawei Technologies and ZTE after holding a Thursday hearing in which the two companies tried to dispel allegations that they were tied to the Chinese government. Read More


WHITE PAPER: Verizon

Verizon Enterprise Mobility Solutions Fact Sheet
Verizon Enterprise Mobility as a Service provides a cost-effective, cloud-based management and security service that enables you to manage and secure your employees' remote access. Learn More

Emma Watson relishing crown as "Most Dangerous Woman on the Web"
Emma Watson, the actress who played Hermione in the Harry Potter movies and this past week was named by McAfee as the most dangerous celebrity to search for on the Web, says she likes her newfound reputation. McAfee says you have about a 12% chance of running into malware if you search on her name. Read More

Hurricanes, floods, fiber cuts keep IT pros on their toes
Many companies are prepared for a disaster, with plans and technologies in place to help sustain operations in the wake of severe weather, hardware failures, human error, and accidents. But not every company is covered. Read More

Cisco aims to secure the data center
New products designed to enforce end-to-end security for high-capacity environments, mobile workers Read More

 
 
 

SLIDESHOWS

Best browsers for Android tablets
Google Play app store, Dolphin, Firefox and Opera Mobile are optimized for smartphones, but how well do they work on tablets?

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Apple's iPhone: The untold story
  2. 12 lines that IT help desk hates to hear
  3. iPhone for less: Walmart pricing starts at $189.97
  4. Why innovative app developers choose Android first
  5. History's first prank call was way back in ... 1884?
  6. Low-cost RADIUS servers for Wi-Fi security
  7. Gartner: 5 things a private cloud is NOT
  8. Apple introduces the iPhone 5
  9. 'So, random passerby, how do you like this iPhone 5?'
  10. Forget iPhone 5: 10 top Apple alternatives
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: