Friday, December 21, 2012

VMware patches 'critical' vulnerability

  FCC issues security guidance to smartphone users | DOJ to use prosecutorial powers in state-sponsored cyberespionage
 
  Network World Security

Forward this to a Friend >>>


VMware patches 'critical' vulnerability
VMware has issued a patch for its VMware View product that fixes a security vulnerability that could allow an unauthorized user to access system files. Read More


WHITE PAPER: Quest Software

The Right Way to Prove Identity and Establish Trust
Right now, someone's logging into your network and accessing proprietary data. Do you know who it is? Ensuring the identity of the person(s) trying to access your network is harder than ever. This Quest technical brief explains why two-factor authentication is superior to password authentication. Read Now!

WHITE PAPER: Trend Micro

Solution Path: Threats and Vulnerabilities
This solution path helps Gartner clients develop a strategy and program for managing threats and vulnerabilities in their IT environments. Read Now

FCC issues security guidance to smartphone users
The U.S. Federal Communications Commission is advising smartphone users on how to protect their mobile devices and data from mobile security threats. Read More

DOJ to use prosecutorial powers in state-sponsored cyberespionage
The Department of Justice (DOJ) plans to throw its prosecutorial weight behind efforts to stem the growing number of foreign government-sponsored cyberattacks against U.S. companies and government agencies. Read More

Why one retailer is migrating away encryption to protect customer data
For retailers, protecting customer payment-card information is critical, and encryption is the typically the way to do that today. But Crutchfield Corp, which sells electronics and other goods online and through catalogs, has decided to migrate away from encryption in favor of an alternative security technology known as tokenization in order to shield sensitive customer data. Read More


WHITE PAPER: Ixia Anue

The Evolving Visibility Challenge
Network monitoring has become more complex over the last few years, due in large part to virtualization and convergence. Learn how a state-of-the-art monitoring system that maximizes your existing monitoring tool investment can help you attain greater visibility into your network without adding complexity. Say goodbye to virtual blind spots. Learn More

33 Best & Worst Celebrity Tech Moments of 2012
If you want to keep up with the Kardashians you really need to sport a Windows Phone 8 Lumia 900 phone, as Kourtney Kardashian told us this year. If you wanna get in tight with Lady Gaga, you need to join her own social network. And if you really want to learn about what made Steve Jobs tick, only Ashton Kutcher can enlighten you. Here are the best – and mostly worst – celebrity tech moments of 2012: Read More

NASA on full court press to deflate doomsday prophecies
Insidious unknown planets lurking behind the sun ready to slam into Earth, supernova set to engulf the planet and giant, unseen asteroids screaming toward our globe are all theories espoused across the Internet as to how we will meet our demise next week on 12/21/2012. Read More

Samsung promises fix for vulnerability in Android devices
Samsung said Wednesday it is working on an update for a software flaw that could allow attackers to siphon personal data from a phone. Read More


WHITE PAPER: HP & Intel® Xeon® Processors

Top 10 Benefits of Virtualization
In this eGuide, Network World sister publications InfoWorld, and PC World examine some of the current uses of blade servers in today's data center, as well as how trends such as server virtualization are reshaping enterprise computing. Read Now!

IBM analysis of Twitter, Facebook and other social sites says you're gonna love holiday travel this year
Maybe the direction had nowhere to go but up or maybe people really just need to get away regardless of how annoying car and air travel has become. Read More

Oracle to stop patching Java 6 in February 2013
Java 6 will be retired from security support in less than two months, and users and businesses should prepare now for its demise, experts said today. Read More

McAfee Inc. takes reputation beating after founder fled police
In the wake of his Belize neighbor's unsolved murder, John McAfee's lurch through the news damaged the reputation of his namesake, the security company McAfee Inc., a brand expert said Thursday. Read More

Facebook messaging changes could let paid advertisements into users' inboxes
Facebook today announced a trial that could let paid advertisers directly message users' in-boxes, which have traditionally been held for messages from friends. Read More

 
 
 

SLIDESHOWS

10 technologies that disappointed in 2012
Here are 10 technologies that fell short of expectations in 2012.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Boeing uses 20,000 pounds of potatoes to check aircraft wireless network signals
  2. Cisco sacrificing one for another?
  3. World of botnet cybercrime paying pretty well these days
  4. Citrix: What kind of company is it anyway?
  5. Readers deserved to know of Google's supporting role
  6. 15 free security tools you should try
  7. How removing 386 support in Linux will destroy the world
  8. 7 technologies poised for failure in 2013
  9. Riverbed announces three releases for the Steelhead Mobile Controller appliance
  10. 10 of the most useful cloud databases
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment