Wednesday, October 10, 2012

Microsoft: Users trying to get something for nothing wind up with malware

  Army special operations wants battlefield biometric tech | Trend Micro takes aim at targeted attacks with custom-designed security service
 
  Network World Security

Forward this to a Friend >>>


Microsoft: Users trying to get something for nothing wind up with malware
People trying a certain method of getting software for free wind up with malware about three-quarters of the time, according to the latest Microsoft Security Intelligence Report. Read More


RESOURCE COMPLIMENTS OF: LogMeIn

Improve IT Productivity with LogMein Rescue
LogMeIn Rescue lets you do more. With Rescue, IT can quickly access, diagnose and solve IT problems anywhere, worldwide. The result: Improved productivity for IT staff, improved customer satisfaction and more time for the important stuff. Stop letting cludgy remote support tools get in your way of delivering great IT support to PCs and Smartphones Do More. Try Rescue today

WHITE PAPER: Blue Coat Systems

Optimize and Secure Cloud, SaaS, BYOD, and Social Media
Today's threat landscape has migrated to the web causing many security professionals to prevent direct Internet access at the branch. But with new cloud-based security solutions from Blue Coat you can re-architect your network to embrace the Internet – safely – and optimize application performance. Learn more.

Army special operations wants battlefield biometric tech
The US Army Special Operations group wants to find out what it takes to build rugged biometric tools it can use under battlefield conditions. Specifically the U.S. Special Operations Command issued a Request For Information from the biometric industry on how to best develop and measure the performance of rugged biometric devices it could use for a number of applications including bomb forensics and... Read More

Trend Micro takes aim at targeted attacks with custom-designed security service
Trend Micro has outlined a product-development strategy it calls "Custom Defense" intended to augment traditional signature-based anti-malware defense with custom-designed signatures to thwart stealthy, targeted attacks. Read More

Malware-infected computers being rented as proxy servers on the black market
Cybercriminals are using computers infected with a particular piece of malware to power a commercial proxy service that funnels potentially malicious traffic through them, according to security researchers from Symantec. Read More


WHITE PAPER: Dell SonicWall

Why Protection and Performance Matters
Outdated firewalls can pose serious security risks and simply adding malware protection inhibits performance. Dell SonicWALL Next-Generation Firewalls overcome these limitations with multi-core architecture and Reassembly-Free Deep Packet Inspection for unrivaled protection and performance. Read Now!

RSA's Coviello calls for privacy laws to be overhauled to improve security
In order to keep hackers at bay there must be changes in security budgets and privacy regulations, RSA boss Art Coviello said on Tuesday. Read More

Windows 7 malware infection rate soars in 2012
Windows 7's malware infection rate climbed by as much as 182% this year, Microsoft said today. Read More

Top 10 cloud jobs
Read More


WHITE PAPER: Citrix Systems

Consolidation Without Compromise
Pay more to get less consolidation? The Iron Age is over. Shift to Citrix NetScaler. 2x consolidation. For less. Get Consolidation Without Compromise now. Learn More

Huawei: House Intelligence Committee report is 'not fact-based'
The United States is a country ruled by law, where all charges and allegations should be based on solid evidence and facts. The report conducted by the House Permanent Select Committee on Intelligence (the Committee), which took 11 months to complete, failed to provide clear information or evidence to substantiate the legitimacy of the Committee's concerns. Read More

Career Watch: Noncertified skills pay still has edge over certs
Latest report from Foote Partners shows the pay advantage has now been documented for six straight years. Read More

Samsung Galaxy Tab too insecure for business use, analysis finds
Samsung's much-vaunted Galaxy Tab has serious security failings that make it completely unsuitable for use by businesses, a technical analysis by consultancy Context Information Security has found. Read More

Rapid7 acquires startup Mobilisafe
Security firm Rapid7 today announced the acquisition of startup Mobilisafe, the Seattle-based provider of a mobile-risk management software and services. Read More

 
 
 

SLIDESHOWS

Top 10 cloud jobs
Researchers at Dice.com have crunched the numbers to come up with a list of the top 10 most available jobs in the cloud.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. A Linux user switches to DOS, Part 2
  2. House Intelligence Committee report blasts Huawei, ZTE as threats to U.S. national security
  3. The ugly, scary year in Apple iPhone and iPad thefts
  4. Cisco said to cut ties with China's ZTE
  5. VMware, the bell tolls for thee, and Microsoft is ringing it
  6. '60 Minutes' torpedoes Huawei in less than 15 minutes
  7. Top 10 cloud jobs
  8. .xxx to launch porn search engine
  9. Cloud careers: It's a seller's market
  10. Spear-phishing lie in wait at 'watering hole' websites
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment