Search This Blog

Wednesday, January 23, 2013

20 Seconds to jailbreak Windows RT

  FTC targets outfits that crammed $70M onto phone bills | Testing The Privacy Company Mega: 50GB free storage, 2048-bit encrypted protection
 
  Network World Security

Forward this to a Friend >>>


20 Seconds to jailbreak Windows RT
There's not a whole lot you can do in half of a minute, but thanks to XDA Developers "netham45," you can run a new tool and jailbreak Microsoft Surface in 20 seconds. Read More


WHITE PAPER: Attachmate

Simplify Your Audits and Compliance Efforts
Managing compliance is a challenge. Learn how to apply this 3-step process to capture activity on your critical systems, analyze data in real-time, query historical records at the press of a button, and simplify your audits. Find out who did what, when—and why. Get the solution brief now. Learn More!

WHITE PAPER: Trusteer

Dealing with Advanced and Targeted Attacks
This whitepaper explains how advanced malware challenges traditional defenses to take advantage of the increased exposure of employee endpoints. It reviews the evolution of advanced targeted attacks and the various approaches used to address them. Learn More.

FTC targets outfits that crammed $70M onto phone bills
The Federal Trade Commission today said it asked a U.S. district court to stop operations of American eVoice, Ltd., eight other companies, whom the agency says stuffed some $70 million in bogus charges on consumers' phone bills. Read More

Testing The Privacy Company Mega: 50GB free storage, 2048-bit encrypted protection
Kim Dotcom's new end-to-end encrypted file storage and sharing service, Mega is being billed as The Privacy Company that "provides robust cloud storage with convenient and powerful always-on privacy. MEGA believes in your right to privacy and provides you with the technology tools to protect it. Read More

Company set to blast squadron of tiny satellites into space to mine asteroids
A new company intends by 2015 to send a fleet of tiny satellites, known as cubesats into near-Earth space to mine passing asteroids for high-value metals. Deep Space Industries asteroid mining proposal begins in 2015 when the company plans to send out a squadron of 55lb cubesats called Fireflies that will explore near-Earth space for two to six months looking for target asteroids MORE: The sizzling... Read More


WEBCAST: PhoneFactor

Strong Security for Remote Workers Is Just a Phone Call Away
Join Steve Dispensa, PhoneFactor Chief Technology Officer, and Sarah Fender, PhoneFactor Vice President of Marketing & Product Management, to learn how phone-based authentication is helping companies tackle complex authentication challenges. Learn More

'Virut' botnet dealt blow as registrar sinkholes domains
Poland's national NASK domain registrar has taken control of 23 domains it said were being used to support the Virus botnet has been attempting to resurrect the tenacious Waledec/Kelihos bot severely damaged by Microsoft in 2011. Read More

Cloud security rebuttal: Don't rebuke the many for the sins of the few
Long-time cloud security advocate Chris Hoff challenges our recent '7 deadly sins' story Read More

A road warrior's guide to locking down your laptop
Mobile computing may be convenient, but it's also inherently risky. When you drag your laptop to the coffee shop or bring it along on your travels, you're making all your private data and one of your most expensive possessions a big, fat target for sticky-fingered thieves. And unlike traditional theft targets like jewelry or wallets, a laptop is an easy steal--the baddies just need to wait for you to turn your back, then grab the computer and run. In some cases, a criminal doesn't even need to steal your notebook. He can simply pull your sensitive data out of thin air. Read More


WEBCAST: CDW Corporation

Unified Threat Management: A Better Approach to Security
In this Webcast you will learn how Unified Threat Management (UTM) combines firewall, IPS, Web filtering, antivirus and more in a single box to combat a broad range of threats efficiently and economically. Learn More.

Are federal agency workers going rogue with personal devices?
Federal agencies continue to struggle with the question of whether to allow employees to use their personal smartphones and tablets at work under so-called bring-your-own-device (BYOD) policies, according to a survey out this month from the organization Telework Exchange. Read More

Spam levels plummet as industry takes aim at botnets
Global spam levels continued to fall in 2012 and even the number of malicious attachments was on the wane, new figures from Kaspersky Lab have suggested. Read More

Bugged guesthouse: Eric Schmidt's daughter reveals North Korea trip details
In North Korea, the Democratic People's Republic of Korea (DPRK), the only people with access to the Internet are those with "special authorization." Very few details have been revealed about what happened during Google Executive Chairman Eric Schmidt's recent visit to North Korea . . . other than he urged DPRK to "embrace" open access to the Internet. Read More

 
 
 

SLIDESHOWS

Microsoft Office Web Apps v. Google Docs
5 reasons why Google Docs is better/5 reasons why Web Apps is better.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Review: Office Web Apps vs. Google Docs
  2. Microsoft to raise Windows 8 upgrade prices by 5X
  3. Google looks to kill passwords, but experts say not so fast
  4. Weird and wonderful Raspberry Pi hacks
  5. Eric Schmidt's daughter reveals North Korea trip details
  6. RSA: How to steal encryption keys off hardware chips and smart cards
  7. Testing the privacy company Mega: 50GB free storage, 2048-bit encrypted protection
  8. Cisco SDN splash coming?
  9. Truth in IT job postings: What those want ads really mean
  10. Major flaw in Java-based Spring Framework allows remote-code execution by attacks
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: