Search This Blog

Friday, October 26, 2012

'Password' is still the worst password, but watch out for 'ninja'

  Baddest Botnets of 2012 | Getting the most out of IPS
 
  Network World Compliance

Forward this to a Friend >>>


'Password' is still the worst password, but watch out for 'ninja'
Although the tech world is always changing, one thing remains the same: A lot of people use terrible passwords. Read More


WHITE PAPER: Avaya

Delivering game-changing productivity & dependability
By creating one contiguous, end-to-end Fabric, Avaya is empowering businesses to achieve unprecedented levels of infrastructure productivity, service agility, and network dependability, the very essence of the fast, flexible, and secure design aspirations. Read Now

RESOURCE COMPLIMENTS OF: AT&T

VoIP Solutions Provide Enterprises With Various Benefits
VoIP migration is a top telecom priority for many North American enterprises. Do you know why? Find out in this Forrester study, which reveals the opinions of telecommunications decision-makers like you. Read the report.

Baddest Botnets of 2012
According to security firm Kindsight, these are the Top Ten Worst Botnets this year. Read More

INSIDER
Getting the most out of IPS
Intrusion prevention systems — security tools designed to stop problems even before they crop up — have emerged as indispensable components of defense-in-depth security strategies. Read More

'Lance Armstrong' bug hunt continues in stable Linux kernel
The discovery of a somewhat alarming bug in the Linux ext4 filesystem provoked a minor wave of panic this week, but project maintainer Theodore Ts'o says it has since become clear that the problem can likely only affect a small number of users. Read More


WEBCAST: VCE & Xerox

Building a Cloud Foundation on IaaS
In this exclusive webcast from VCE, you'll learn how IaaS accelerates your business in adaptable approaches, across geographies; and provides granular visibility and access control. Best of all, IaaS assures adoption, productivity and the innovative benefits of truly flexible infrastructure. Learn more.

Top Linux-o-lanterns from around the Web
Tux the Penguin and friends geek up Halloween pumpkins Read More

DDoS attacks against banks raise question: Is this cyberwar?
It's been a month of crippling denial-of-service attacks on websites operated by U.S. banks and financial services firms. A terrorist organization called Al-Qassam takes credit online, but now the attacks are being blamed on Iran. Read More

Kaspersky's exploit-proof OS leaves security experts skeptical
While there is a need for a more secure operating system for industrial control systems, experts say a U.S.-built OS would be preferred Read More


WHITE PAPER: Shoretel

Sophisticated Simplicity
The key is to build simplicity and ease of use into these solutions from Day 1. This white paper will demonstrate a clear path to UC simplicity, and to overall success of UC deployments. Learn more.

Russian coder puts Microsoft botnet accusation behind him
When 32-year-old Russian programmer Andrey N. Sabelnikov visited the U.S. for the first time in January, he had a surprise waiting for him. Read More

BYOD resistance loosening but security practices lacking
A survey of 650 information and security professionals about how the "bring your own device" (BYOD) trend is impacting their organizations finds one-quarter of them forbid use of personally owned devices such as smartphones and tablets on the network. However, the majority that do often lack meaningful policies or security controls related to these devices. Read More

Barnes & Noble halts use of PIN pad devices after data breach
Barnes & Noble has removed PIN pad devices from all of its nearly 700 stores nationwide as a precaution after detecting evidence of tampering with the devices at 63 of its stores in eight states. Read More

FTC: Companies should limit facial recognition in some cases
Web companies using facial recognition technology should avoid identifying anonymous images of consumers to someone who could not otherwise identify them, unless the companies have the consumers' consent, a U.S. Federal Trade Commission report said. Read More

Android malware exploding, says Trend Micro
The amount of mobile Android malware has surged this year, from a count of 30,000 malware specimens in June to almost 175,000 last month, according to Trend Micro's Security Roundup report for the third quarter of this year. Read More

 
 
 

SLIDESHOWS

Top 10 tech gadgets of 2012
Here are 10 that made a significant impact in the industry this year.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Google Maps puts well-funded startup in the poorhouse
  2. Does OpenStack need a Linus Torvalds?
  3. DDoS attacks against banks raise a question: Is this cyberwar?
  4. 9 things enterprise IT will like about Windows 8
  5. The new iPads: What you need to know
  6. VMware, the bell tolls for thee, and Microsoft is ringing it
  7. Country's largest 4-year university expels Cisco, saves $100 million
  8. .xxx to launch porn search engine
  9. Gartner: 10 critical IT trends for the next five years
  10. Sycamore Networks headed to tech industry graveyard
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: