Search This Blog

Friday, September 07, 2012

Virus infects a banking Trojan, leaving both operative

4 security suites that protect all your devices | FBI denies it was source of leaked Apple device ID data

Network World Compliance

Forward this to a Friend >>>


Virus infects a banking Trojan, leaving both operative
When malware infects a machine it usually goes after the system software. But in a rare case worked on by SpiderLabs, researchers found a Trojan that had been infected by a virus, leaving both still functioning as normal. Read More


RESOURCE COMPLIMENTS OF: Google

Google Apps for Business
Do more for less with your team using Google Apps. Custom web-based email, calendars, and documents to easily share & work together in the cloud. Start with a free 30-day trial!

WHITE PAPER: CA Technologies

Delivering Exceptional Applciation Experience
Enterprises can achieve customer advantage by monitoring the quality and timeliness of mission-critical applications. Read this whitepaper to learn how with CA Technologies Application Performance Management solutions. Learn More

4 security suites that protect all your devices
Security suites from McAfee, Symantec, Trend Micro and Webroot offer protection for all your devices along with Web-based management. Read More

FBI denies it was source of leaked Apple device ID data
The FBI denied that the 1 million unique device identifiers for Apple devices posted publicly by hacker group AntiSec on Monday had come from its computers. Read More

Broadcaster Al Jazeera knocked offline with DNS attack
Websites of broadcaster Al Jazeera were offline as of late Tuesday as the media outlet continued to suffered from an attack against Domain Name System (DNS) servers. Read More


WHITE PAPER: PhoneFactor

A New Standard For Online Banking Security
This whitepaper provides an overview of the updated Guidance and the threat landscape which helped define it, examines why previous security measures are no longer effective, and why new methods like out-of-band authentication with transaction verification are key to protecting online banking today. Learn More

10 tips for implementing BYOD securely
With the Bring Your Own Device (BYOD) movement quickly becoming an accepted norm, IT needs to better understand how it impacts all aspects of the corporate network security strategy. Read More

Does a Cyber-9/11 Loom?
The longer Congress waits to gets its act together on cybersecurity, the longer the U.S. remains at risk of an attack by spies, terrorists, hackers or companies representing themselves or an entire rogue nation. Can Washington rise to the challenge without crushing civil liberties? Read More

Is Your ISP Spying On You?
Arcticsid asked the Answer Line forum if his ISP can "sit back...watch a screen, and see everything you are doing at any given time?" Read More


WHITE PAPER: Solutionary, Inc.

Contextual Security Provides Actionable Intelligence
Think of context as the key ingredient for making better and faster decisions about protecting enterprises from escalating risks. This paper examines scenarios from real organizations to help illustrate how context in security has delivered measureable improvements. Learn more.

CipherCloud widens cloud-based encryption options
CipherCloud this week broadened its encryption gateway support to include support for Microsoft's SharePoint, as well as the services Yammer and SAP's SuccessFactors. Read More

12 Tips to Prevent a Healthcare Data Breach
High-profile healthcare data breaches continue to make the news. Heed our 12-step program and keep your organization out of the headlines. Read More

McAfee: New malware is proliferating
Instances of malware continue to increase steadily, with the number of new threats reaching the highest point since 2009, McAfee says. Read More

Rogue Microsoft Services Agreement email notifications lead to latest Java exploit
Hackers are distributing rogue email notifications about changes in Microsoft's Services Agreement to trick people into visiting malicious pages that use a recently circulated Java exploit to infect their computers with malware. Read More



SLIDESHOWS

Tech CEOs' first jobs: Licorice maker, housekeeper, scuba diver and more
Before their corporate jobs, many tech CEOs got their hands dirty, scrubbing oils stains off asphalt, cleaning bathrooms, and shoveling monkey cages. Here are their stories.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. 12 hot cloud computing companies worth watching
  2. Great tech for $25 or less: affordable-gadget roundup
  3. Most wild, wacky & wonderful Wi-Fi installations
  4. The case for LTE: 4 reasons why you need 4G
  5. No evidence of breach in Romney tax return extortion case
  6. Desktop Linux is dead? I thought it was thriving
  7. Motorola announces new Droid Razr smartphones
  8. Cisco, HP switching share down in Q2
  9. Android: Everyone's favorite new malware target
  10. Linux Mint 13 leaves sour aftertaste

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: