Search This Blog

Tuesday, December 18, 2012

Microsoft downplays privacy risk from IE bug as Steal from IE Users game launches

Microsoft's antivirus is a starting point, not the final stop | Single sign-on moves to the cloud

Network World Security

Forward this to a Friend >>>


Microsoft downplays privacy risk from IE bug as Steal from IE Users game launches
Does tracking the position of your mouse cursor pose a privacy risk? A UK company said some advertisements are setup with JavaScript to determine the mouse position and thereby determine if an ad was displayed in the browser window. Advertising analytics company Spider.io claimed that two companies were exploiting this via a flaw in Microsoft IE 6 - 10. Microsoft said Spider.io has exaggerated the... Read More


RESOURCE COMPLIMENTS OF: SolarWinds, Inc.

Detect & Respond to Network Security Attacks!
Successful network, application, and system defense rests on the ability to identify and respond to threats immediately – before they become a problem. SolarWinds Log and Event Manager (LEM) gives you the firepower you need to defend your infrastructure! Experience it for yourself with our full-featured, 30-day free trial. Try it today!

WHITE PAPER: Quest Software

The Right Way to Prove Identity and Establish Trust
Right now, someone's logging into your network and accessing proprietary data. Do you know who it is? Ensuring the identity of the person(s) trying to access your network is harder than ever. This Quest technical brief explains why two-factor authentication is superior to password authentication. Read Now!

Microsoft's antivirus is a starting point, not the final stop
Last week's blog post from Alan Shimel that showed Microsoft's antivirus software, Security Essentials, is the most popular antivirus software product in the world came as no surprise. They give it away for free and push it on you if you go anywhere near Microsoft.com. Read More

INSIDER
Single sign-on moves to the cloud
We are awash in passwords, and as the number of Web services increases, things are only going to get worse. Trying to manage all these individual passwords is a major problem for enterprise security. Many end users cope by re-using their passwords, which exposes all sorts of security holes. Read More

Trade group objects to proposed NIST mobile security guidelines
A mobile security technology proposal drafted by the National Institute of Standards and Technology (NIST) is being soundly rejected by one of the main trade groups representing a broad cross-section of industry. Read More


WEBCAST: PhoneFactor

Strong Security for Remote Workers Is Just a Phone Call Away
Join Steve Dispensa, PhoneFactor Chief Technology Officer, and Sarah Fender, PhoneFactor Vice President of Marketing & Product Management, to learn how phone-based authentication is helping companies tackle complex authentication challenges. Learn More

IBM: In the next 5 years computers will learn, mimic the human senses
IBM today issued its seventh annual look at what Big Blue researchers think will be the five biggest technologies for the next five years. In past prediction packages known as "IBM 5 in 5" the company has had some success in predicting the future of password protection, telemedicine and nanotechnology. Read More

Another data-wiping malware program found in Iran
A new piece of malware that deletes entire partitions and user files from infected computers has been found in Iran, according to an alert issued Sunday by Maher, Iran's Computer Emergency Response Team Coordination Center (CERTCC). Read More

After Newtown tragedy, cops target social net pranksters
In the wake of the tragic school shooting in Newtown, Conn, police warned that they will prosecute anyone purposefully posting false information related to the incident on social networks. Read More


WEBCAST: CDW Corporation

Unified Threat Management: A Better Approach to Security
In this Webcast you will learn how Unified Threat Management (UTM) combines firewall, IPS, Web filtering, antivirus and more in a single box to combat a broad range of threats efficiently and economically. Learn More.

NASA on full court press to deflate doomsday prophecies
Insidious unknown planets lurking behind the sun ready to slam into Earth, supernova set to engulf the planet and giant, unseen asteroids screaming toward our globe are all theories espoused across the Internet as to how we will meet our demise next week on 12/21/2012. Read More

SSD prices continue to plunge
Solid-state drive pricing has dropped about 30% this year, reaching what researchers call the magic price point of $1-per-gigabyte of capacity, according to information from IHS iSupply and Dynamite Data Read More

Top tools for single sign-on
Okta, OneLogin score high in test of 8 solutions that beef up app security and cut help desk calls. Read More

7 Tech Trends That Will Impact Your Business in 2013
What's in store for 2013? IT professionals need to be prepared for a mix of old (biometrics), new (3-D printing), borrowed (apps for watching TV) and blue (unemployed skeuomorphic designers). Read More

BlackBerry blacklists the 'Pooh' gang
A report surfaced recently contending that BlackBerry OS 10 will include a list of 106 prohibited passwords designed to prevent the clueless from choosing the likes of 123456, blackberry, or the ever-popular "password" as their password. Read More



SLIDESHOWS

Top network and IT industry stories of 2012
The cloud, tablets, software-defined networking, IPv6 and 4G wireless reshape the enterprise IT landscape in 2012.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. iPhone 6 rumor rollup for the week ending Dec. 14
  2. Cisco reportedly shopping Linksys division
  3. Showcasing Surface Tablet and Windows 8 at the Palo Alto Microsoft Store
  4. Single sign-on moves to the cloud
  5. 'The Hobbit 2.0' -- How mobile technology would improve J.R.R. Tolkien's famous work
  6. 16 most anticipated tech products of 2013
  7. 13 events that defined Cisco's 2012
  8. Riverbed announces three releases for the Steelhead Mobile Controller appliance
  9. 10 most successful open source projects of 2012
  10. The irrepressible evolution of the PC mouse

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: