Search This Blog

Tuesday, April 09, 2013

AV-Test issues first Windows 8 antivirus solution ratings

  The 5 biggest online privacy threats of 2013 | Scientists tout advanced process to find surgical robot bugs before the bot cuts off something important
 
  Network World Security

Forward this to a Friend >>>


AV-Test issues first Windows 8 antivirus solution ratings
Windows 8 virus scanners were evaluated for the first time by AV-Test Institute, an independent testing house. Using the vendors' default settings, AV-Test assessed protection, performance and usability categories before certifying 26 home user security products and nine corporate endpoint protection products. The German-based security firm ran its test throughout January and February 2013. Each product... Read More


WHITE PAPER: Trusteer

Dealing with Advanced and Targeted Attacks
This whitepaper explains how advanced malware challenges traditional defenses to take advantage of the increased exposure of employee endpoints. It reviews the evolution of advanced targeted attacks and the various approaches used to address them. Learn More.

WHITE PAPER: EMC Corporation

Data Protection Visibility with EMC Data Protection Advisor
With better visibility and insight into a key service delivery area like backup, data protection providers can get better information with less effort—and their clients are the beneficiaries. Learn More

The 5 biggest online privacy threats of 2013
Your online life may not seem worth tracking as you browse websites, store content in the cloud, and post updates to social networking sites. But the data you generate is a rich trove of information that says more about you than you realize--and it's a tempting treasure for marketers and law enforcement officials alike. Read More

Scientists tout advanced process to find surgical robot bugs before the bot cuts off something important
When it comes to having robotic surgeons slicing around inside your brain, heart or other important body organ, surgeons and patients need to know that a software or hardware glitch isn't going to ruin their day. That's why a new technique developed by researchers at Carnegie Mellon University and the Johns Hopkins University Applied Physics Laboratory that promises to reliably detect software bugs... Read More


WHITE PAPER: PhoneFactor

Phones Become the Leading Multi-Factor Authentication Device
According to a leading analyst firm, phone-based authentication will comprise 61% of the multi-factor authentication market by the year 2014. This paper will address the key drivers for this market shift away from security tokens and includes real-world case studies from organizations that have made the move to phone-based authentication. Learn More

Top 10 cloud tools
Cloud vendors are delivering boatloads of new tools to help enterprise IT build, buy, manage, monitor, tweak and track cloud services. These tools are designed to help IT execs free up their budgets and their staff so both can be used towards more strategic, line of business projects. Read More

DHS warns of spear-phishing campaign against energy companies
The Department of Homeland Security has a warning for organizations that post a lot of business and personal information on public web pages and social media sites: Don't do it. Read More


WHITE PAPER: F5 Networks

A Model for Effective Persistent Threat Management
Persistent Threat Management is a new operational model that takes advantage of integration and automation capabilities between vulnerability scanning services and web application firewalls. This paper looks at the application of the model in protecting web applications against exploitation. Read Now

Army defends its mobile device security plan
The Department of Defense's inspector general has reposted and updated a report critical of the Army's shortcomings in handling cybersecurity for commercial mobile devices (CMD), with some changes to correct for what it says were mistakes. Read More

12 Must-Do PC Tasks
Computers may have become a lot more user-friendly over the past decade, but they're still far from perfect--PCs require a certain amount of configuration and maintenance to operate at their full potential. Unfortunately, because we humans are also far from perfect, we frequently don't put in the work we should, and we end up with a slower, sloppier, less secure machine as a result. Read More

Anonymous cyberattack on Israel finds disputed impact
Although the hactivist group Anonymous had declared its supporters would attack Israel on April 7 and "erase Israel from cyberspace," the damage from Anonymous so far appears to be minimal to Israeli government and bank websites that are among the main targets. However, now Israeli hactivists are fired up and counter-striking at Palestinian, Iranian and Turkish website targets. Read More

 
 
 

SLIDESHOWS

8 things you might not know about Android

Some lesser-known facts about Google's mobile OS.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. I ditched Windows 8 and went Ubuntu by mistake

2. iPhone 6 rumor rollup for the week ending April 5

3. Nonstop cloud computing price war: Amazon, Google both drop rates again

9. Why the Facebook Phone will be a flop

5. Army defends its mobile device security plan

6. Windows 8: How to solve the Start Button dilemma

4. Microsoft's Patch Tuesday for April to address Windows 8 vulnerabilities

7. SIP trunking: The savings are there but the transition is complex

8. How that 'extra 9' could ward off Zombie Apocalypse

10. Google Grim Reaper: The latest killed projects

 

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: