Search This Blog

Wednesday, March 06, 2013

Microsoft may not scan your email for keywords like Google, but your boss can

  Google squashes 10 Chrome bugs as $100K Pwn2Own hacking prize looms | How different tech degrees measure up
 
  Network World Security

Forward this to a Friend >>>


Microsoft may not scan your email for keywords like Google, but your boss can
The Scroogled campaign in which Microsoft warned about Google disrespecting your privacy by scanning "every word of every email" to deliver ads in Gmail is now winding down. Read More


WHITE PAPER: Moovweb

3 Steps to a Cost-Effective Mobile Strategy
In the new Moovweb white paper, "Creating the Right Mobile Strategy: What You Need to Know Before You Get Started", get the insight you need to make an educated decision on the move to mobile. Read Now!

WHITE PAPER: Cirba

How to Reduce Processor-Based Software Licensing Costs
Most organizations that license software such as Windows, SQL Server, Oracle Weblogic and Oracle Database on a per processor or per host basis are spending far more than is required. By optimizing VM placements considering licensing, utilization, business and technical policies, organizations can achieve savings of greater than 50%. Learn More

Google squashes 10 Chrome bugs as $100K Pwn2Own hacking prize looms
Google today patched 10 vulnerabilities in Chrome, just two days before the start of Pwn2Own, a hacking contest that has $100,000 in prize money waiting for the first researcher to crack the browser Read More

How different tech degrees measure up
Read More


WHITE PAPER: AccelOps

Operationalizing Information Security ebook
The use of security information and event management (SIEM) as part of an integrated security management program is an information security best practice. Read Now

Oracle should stop sneaking Ask.com adware into Java updates
Like most of you, I received a notice to update Java on my laptop yesterday. It seems like it has become a weekly occurrence. In fact, Java has taken the place of Flash as the primary attack vector used by the bad guys. So, I dutifully clicked the "update now" button. I sat through the download, the extraction and the installer firing up. I was clicking through when I came to the screen below. Luckily,... Read More

Hope these guys don't work for Yahoo!: Nearly 600,000 mega-commuters have 90 minute ride to work
If anyone needs a pretty darn good reason to telecommute it's these guys: the nearly 600,000 mega-commuters whose ride to work is 90 minutes or longer and ove Read More


WEBCAST: Cisco

Smart Solutions Deliver Unified Workspace Strategy
Workers today use up to four mobile devices daily--yet companies are struggling to integrate mobile devices into their business models. Learn how Cisco Unified Workspace can help meet these challenges for increased efficiency and growth. View Now

Cybercriminals using digitally signed Java exploits to trick users
Security researchers warn that cybercriminals have started using Java exploits signed with digital certificates to trick users into allowing the malicious code to run inside browsers. Read More

Privacy as product differentiation. Is it time?
One of the big problems standing in the way of getting anything that remotely resembles a concern among Internet companies for the privacy rights of their customers is that there has been no business reason for any such concern. That may be changing, but don't bet big on the possibility. Read More

Five new flaws found in the latest version of Java
A week after disclosing two Java vulnerabilities, a Polish security firm reported finding five more in the latest version of Java. When used together, the new holes could bypass the technology's sandbox in order to install malware. Read More

'Tis the season for tax scammers -- and now, 'long-lining' phishers
The upcoming April 15 tax filing deadline in the U.S. has tax scammers popping up in larger numbers online even as a new phishing trend called long-lining is starting to gather steam. Read More

 
 
 

SLIDESHOWS

How different tech degrees measure up

Here's our list of lucrative tech degrees, ranked from lowest to highest starting salary.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Yahoo CEO Mayer checked VPN logs before banning home networking

2. Why the 'trombone' effect is problematic for enterprise Internet access

3. Which tech degrees pay the most from day one?

9. EMC unveils all-SSD array, one app to manage all flash

5. First look: BlackBerry Enterprise Service (BES) 10

6. White House urges reversal of ban on cell-phone unlocking

7. Tablet wars: Microsoft Surface RT v. Apple iPad

8. Starbucks that Steve Jobs prank called still receives mock orders for 4,000 lattes to go

10. 14 killer hardware deals that cost $100

4. Driven by 10G, Ethernet switches buck economic headwinds

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: