Search This Blog

Friday, November 09, 2012

Twitter asks many users to change passwords

Evolving security standards a challenge for cloud computing, expert says | Zero-day PDF exploit reportedly defeats Adobe Reader sandbox protection

Network World Security

Forward this to a Friend >>>


Twitter asks many users to change passwords
Twitter appears to have reset the passwords for an undetermined portion of its user base because of a possible security breach. Read More


RESOURCE COMPLIMENTS OF: DameWare, part of the SolarWinds Family

Affordable Remote Support Software for Mixed-OS Environments
DameWare Remote Support Software allows you to control Mac OS X, Linux and Windows machines - without leaving your desk! Fix end-users problem quickly & remotely with DameWare. Manage your IT infrastructure - domains, workstations, disk drives, & event logs - all from one console AND in a mixed-OS environment. Easy to afford. Simple to use. It's so affordable – why not just try it? Download a fully functional, free 14-day trial today and discover why thousands of system administrators use DameWare to remotely control Mac, Linux and Windows machines every day!

WHITE PAPER: PhoneFactor

A New Standard For Online Banking Security
This whitepaper provides an overview of the updated Guidance and the threat landscape which helped define it, examines why previous security measures are no longer effective, and why new methods like out-of-band authentication with transaction verification are key to protecting online banking today. Learn More

Evolving security standards a challenge for cloud computing, expert says
Any enterprise looking to use cloud computing services will also be digging into what laws and regulations might hold in terms of security and privacy of data stored in the cloud. At the Cloud Security Alliance Congress in Orlando this week, discussion centered on two important regulatory frameworks now being put in place in Europe and the U.S. Read More

Zero-day PDF exploit reportedly defeats Adobe Reader sandbox protection
Cybercriminals are using a new PDF exploit that bypasses the sandbox security features in Adobe Reader X and XI, in order to install banking malware on computers, according to researchers from Russian security firm Group-IB. Read More


WHITE PAPER: Fiberlink

The 10 Commandments of BYOD
The rapid proliferation of mobile devices entering the workplace feels like divine intervention to many IT leaders. It's as if a voice boomed down from the mountain ordering all of the employees you support to procure as many devices as possible and connect them to corporate services en masse. BYOD was born and employees followed with fervor. Read Now!

Heist once again highlights e-banking vulnerabilities
The CFO of a Missouri firm who discover that cyber thieves had withdrawn $180,000 from the company's account overnight called it "a helluva wake-up call." But he might have avoided the mess if he has paid better attention to the risks of electronic banking. Read More

Chinese ex-hacker says working for the government would be too boring
Tao Wan now works at IBM, but said he was once an angry young man, a veteran of the hacking scene that burgeoned in China in the late 1990s. Read More


WEBCAST: HP Intel VMware

A Lower Entry Cost for Desktop Virtualization
High entry costs and overall complexity have prevented many SMBs from taking advantage of the benefits of client virtualization. Now HP and VMware have teamed to bring desktop virtualization that delivers results right out of the box. Learn More

Astronomers find Super Earth that could support life – 42 light years away
Astronomers have spotted a planet they call a "super-Earth" about 42 light years away that could have liquid water and an atmosphere stable enough to support life as we know it. Read More

Microsoft Trustworthy Computing finally pays off in a big way
Back in 2002, then-Microsoft CTO and senior vice president Craig Mundie authored a whitepaper on what would become the framework of the company's Trustworthy Computing program. It would be built around four pillars that all Microsoft products would embrace: Security, Privacy, Reliability and Business Integrity. Read More



SLIDESHOWS

15 people who said no to Facebook
Here are 15 people who have declined an opportunity with the social networking giant.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. 2013 IT salaries: 15 titles getting the biggest pay raises
  2. How (and why) to surf the Web in secret
  3. Barack Obama's post-election Tweet is most popular of all time
  4. '80M bytes of storage for under $12K!' and other IT ad favorites through the years
  5. Yawns may greet Microsoft Office port to iOS and Android
  6. VMware, the bell tolls for thee, and Microsoft is ringing it
  7. .xxx to launch porn search engine
  8. Microsoft DRM technology will take a head count, check ID
  9. Microsoft Trustworthy Computing finally pays off in a big way
  10. Gartner's IaaS Magic Quadrant: a who's who of cloud market

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: