Search This Blog

Thursday, October 04, 2012

Who holds IT security power?

  FTC bombs online tech support scammers | Router flaw allowed DNS attack on 4.5 million DSL gateways
 
  Network World Security

Forward this to a Friend >>>


Who holds IT security power?
From Apple, to Symantec and Anonymous, lots of people, companies and groups influence the IT security world Read More


RESOURCE COMPLIMENTS OF: Samsung Enterprise Mobility

Mobile Security. Don't let someone else decide for you.
Are you secure from information leaks? With Samsung Galaxy S Ⅲ, you can gear up your staff with mobile security. With AES 256-bit encryption, Microsoft Exchange ActiveSync, VPN connectivity and MDM support (on 330+ IT policies), there's no better way to keep sensitive data safe than the new Galaxy SIII. Meet Enterprise-Ready Samsung Galaxy S III

WHITE PAPER: Meru Networks

Understanding the 802.11ac standard
This white paper gives an overview of this emerging standard, debunks some myths, provides a view on how the technology will be introduced, and describes its importance in the enterprise network. Learn more.

FTC bombs online tech support scammers
The Federal Trade Commission today said it cracked down on tech support scammers who used telemarketers masquerading as major computer companies including Dell, Microsoft, McAfee and Norton to con consumers into believing that their computers are riddled with viruses, spyware and other malware. The companies of course would then charge hundreds of dollars to "fix" or "remove" the problems. Read More


WEBCAST: Teradata

Big Data Done Right
View this on-demand webcast to learn how to reap the benefits of big data through a practical unified architecture; how to improve performance with in-memory technology; and how to lower costs and increase scalability through cloud computing. Register now.

Router flaw allowed DNS attack on 4.5 million DSL gateways
Details have emerged of an extraordinary attack in which millions of DSL broadband routers in Brazil were hit by a serious software flaw that allowed criminals to gain complete control of all web traffic running through them. Read More


WHITE PAPER: Blue Coat Systems

Optimize and Secure Cloud, SaaS, BYOD, and Social Media
Today's threat landscape has migrated to the web causing many security professionals to prevent direct Internet access at the branch. But with new cloud-based security solutions from Blue Coat you can re-architect your network to embrace the Internet – safely – and optimize application performance. Learn more.

DHS utility, manufacturing security protection system blasted as useless in Senate report
America's system of so-called "Fusion Centers" established by the Department of Homeland Security (DHS) for companies like utilities and manufacturers to report incidents that may have national-security implications is operated in a way that's "shoddy, rarely timely," and "sometimes endangering citizens' civil liberties and Privacy Act protections." Read More

TraceSecurity rolls out cloud-based risk, compliance and audit tool
TraceSecurity today announced a cloud-based risk, compliance and audit tool that lets enterprises poll internal network assets and deliver live reports about how well the enterprise is keeping up complying with various security standards and regulations. Read More

'Malnets' behind two thirds of cyberattacks attacks in 2012
A growing army of malware delivery networks a 'malnets' a account for two thirds of all cyberattacks and most current technologies offer an inadequate response to the threat, security firm Blue Coat has argued in a new analysis. Read More

 
 
 

SLIDESHOWS

DEMO 2012: 20 awesome products
Augmented reality, human-computer interaction without a touchscreen, and plenty more highlight this year's DEMO Fall 2012 conference.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. HP takes aim at Cisco, Juniper with full SDN portfolio splash
  2. Sandia lab fires up 300,000 virtual Android devices to test out security
  3. 15 best iPhone apps for newbies
  4. Trying to fill 6,000 jobs, Microsoft pitches $10,000 H-1B visa
  5. Is antivirus dead? Startup launches first 'exploit blocking' program
  6. .xxx to launch porn search engine
  7. iPhone, iPad users howl over battery drain after iOS 6 upgrade
  8. First look: Ubuntu 12.10
  9. Cisco releases major update to its security management product
  10. Gartner report throws cold water on uber-hyped OpenStack project
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: