Search This Blog

Thursday, January 03, 2013

Microsoft issues quick fix for critical 0day hole in IE

  Cybersecurity New Year's Resolutions for All PC Users | New year's tech resolutions: Best digital practices for 2013
 
  Network World Security

Forward this to a Friend >>>


Microsoft issues quick fix for critical 0day hole in IE
There seems to have been no rest for Microsoft over the 2012 holidays as it issued a quick fix for a zero-day IE vulnerability that attackers were actively exploiting via drive-by download attacks. It may have felt like a flashback for the company as it also rushed to issue an emergency out-of-band update to deal with vulnerabilities in late December 2011. Read More


WHITE PAPER: Trusted Computing Group

Architect's Guide: Mobile Security Using TNC Technology
Mobile Security means managing access to corporate networks to maximize the value to staff, contractors, and even guests with mobile devices, while minimizing risk to the organization. Learn More.

WHITE PAPER: Trusteer

Dealing with Advanced and Targeted Attacks
This whitepaper explains how advanced malware challenges traditional defenses to take advantage of the increased exposure of employee endpoints. It reviews the evolution of advanced targeted attacks and the various approaches used to address them. Learn More.

Cybersecurity New Year's Resolutions for All PC Users
Happy New Year world! Like many of my fellow bloggers and analysts, I'll have my own set of security predictions for 2013 soon. One thing I can easily surmise however is that cybersecurity will become more dangerous and more sophisticated this year just as it has in the past. Read More


WEBCAST: PhoneFactor

Strong Security for Remote Workers Is Just a Phone Call Away
Join Steve Dispensa, PhoneFactor Chief Technology Officer, and Sarah Fender, PhoneFactor Vice President of Marketing & Product Management, to learn how phone-based authentication is helping companies tackle complex authentication challenges. Learn More

New year's tech resolutions: Best digital practices for 2013
Losing weight and quitting smoking are resolutions most of us don't keep through January. But there are ways to improve your online security, PC hardware performance and even financial bottom line that require little vigilance and just a few mouse clicks. You don't even need to break a sweat. Read More


WEBCAST: CDW Corporation

Unified Threat Management: A Better Approach to Security
In this Webcast you will learn how Unified Threat Management (UTM) combines firewall, IPS, Web filtering, antivirus and more in a single box to combat a broad range of threats efficiently and economically. Learn More.

CIA whacks at Hollywood spy agency myths
The CIA had a few problems with the agency's portrayal in the recently released "Zero Dark Thirty" movie about the successful hunt for Usama Bin Ladin, so much so the acting director issued a statement about the film and the organization wrote up an interesting top "Hollywood Myths vs. the Real CIA" list. Read More

7 deadly sins of cloud computing
Increasing your use of cloud computing? Great! Making these common security mistakes? Not great! Read More

The 'January Effect' for cyberattacks is real, say experts
If you're reading this, then the world hasn't ended per the Mayan calendar. But it still might be a good idea for those in the information security business to be wary of this time of year. Read More

 
 
 

SLIDESHOWS

33 Best & Worst Celebrity Tech Moments of 2012
Playing Steve Jobs, Gaga over social networking and more tech endorsements than you can shake an iPhone at.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. 2012: The tech year in cartoons
  2. Notable deaths of 2012 from the worlds of technology, science & inventions
  3. Best IT resolutions for 2013
  4. 9 IT career resolutions for 2013
  5. Critical infrastructure malware infections
  6. iPhone 6 rumor rollup for the week ending Dec. 21
  7. 2013 will be the first year since 1987 to ...?
  8. Why Windows To Go is perfect for BYOD
  9. Technologies to watch 2013: Cisco products, more maturity for SDNs
  10. Report predicts wave of tech divestitures in 2013
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: