Search This Blog

Thursday, April 18, 2013

Microsoft moves to optional two-factor authentication

  Apple keeps patching Java on OS X Snow Leopard after proposed drop-dead date | IT supply-chain security standard aims to prevent counterfeits, tampering
 
  Network World Security

Forward this to a Friend >>>


Microsoft moves to optional two-factor authentication
Following similar initiatives by Apple, Google and Facebook, Microsoft is enabling two-factor authentication for its Microsoft Account service, the log-on service for many of its online and desktop products. Read More


WEBCAST: Ipswitch FT

Go beyond FTP with Secure Managed File Transfer
Tony Perri, Solutions Architect for Ipswitch File Transfer, will show you the most common business and technical challenges organizations face around securely transferring files to get work done. Learn about managed file transfer and how it can help you and your organization Learn More

WHITE PAPER: Trusteer

Dealing with Advanced and Targeted Attacks
This whitepaper explains how advanced malware challenges traditional defenses to take advantage of the increased exposure of employee endpoints. It reviews the evolution of advanced targeted attacks and the various approaches used to address them. Learn More.

Apple keeps patching Java on OS X Snow Leopard after proposed drop-dead date
Apple on Tuesday patched Java for the aged OS X Snow Leopard and tweaked Safari to give users more control over what websites they let run the vulnerability plagued Oracle software. Read More

IT supply-chain security standard aims to prevent counterfeits, tampering
The danger of counterfeit and tampered IT products is well known, and to fight it, the Open Group has published a technical security standard aimed at supply-chain safety. It's anticipated that by year-end there will also be an official process under way for accreditation so technology suppliers can prove adherence to the standard, according to some involved, which include IBM and Cisco. Read More

Kaspersky Lab launches world's first anti-malware product for UEFI
Microsoft Malware Protection Center recently discovered a sneaky Trojan that deletes its components to stop forensic investigators and researchers from analyzing it. The downloader was the payload. On the MMPC blog, Jonathan San Jose wrote about TrojanDownloader:Win32/Nemim.gen!A: Read More


WHITE PAPER: Moovweb

3 Steps to a Cost-Effective Mobile Strategy
In the new Moovweb white paper, "Creating the Right Mobile Strategy: What You Need to Know Before You Get Started", get the insight you need to make an educated decision on the move to mobile. Read Now!

IT pro has a hair-raising hobby: competitive bearding
By day Chad Roberts, 35, is a Windows Server & Exchange administrator for Berkshire Hathaway Media Group. For play he's an award-winning competitive beardsmith and founder of the RVA Beard League. At right is his Spiderman beard that won a competition in New Jersey last month. Read More

DDOS attacks have increased in number and size this year, report says
The volume, duration and frequency of distributed denial-of-service (DDOS) attacks used to flood websites and other systems with junk traffic have significantly increased during the first three months of this year, according to a report released Wednesday by Florida-based DDOS mitigation provider Prolexic. Read More

15 most innovative products at DEMO Mobile 2013
The DEMO conference has a storied past, serving as a launching pad for businesses that would grow into industry powerhouses, such as VMware and Salesforce.com. With the DEMO Mobile conference set to kick off this week, here's a look at the most innovative mobile products that will see the stage. Read More


WHITE PAPER: PhoneFactor

Malware Threats Force Authentication to 'Step Out' Of Band
Malware, like ZeuS and other real-time attacks, has rapidly outpaced all other banking security threats to defeat most security measures in place today. This whitepaper examines these current malware threats and today's best practices for mitigating them, such as out-of-band authentication and transaction-level verification. Learn More

How QR codes can hack your phone
By: Bhavesh Naik With the huge popularity in mobile devices like the smartphone and tablets, two-dimensional barcodes, also called QR codes, are beloved by marketers. QR codes, or Quick Response codes, were designed for the automotive industry in Japan. Now, QR codes have become popular outside the industry due to greater reliability and storage space. Originally designed for industrial application,... Read More

Startup Armor5 debuts with cloud-based security for mobile devices
Startup Armor5 makes its debut Wednesday with a cloud-based security and management service for mobile devices that works without needing client-based software. Read More

AVG releases free 'TuneUp' application for Android devices
Security vendor AVG has released an application for Android that lets users adjust power settings and manage applications to conserve battery power. Read More

 
 
 

SLIDESHOWS

How to solve Windows 8 crashes

Like any computer operating system, Windows 8 can fall over. Luckily, there is an easy way to diagnose the cause of most crashes.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 13 PC technologies that need to disappear, stat!

2. How hacking fixed the worst video game of all time

3. Computer problem grounds all American Airlines flights

10. Windows Blue may restore Start button, Desktop, Microsoft's hopes

9. Tactics of WordPress attackers similar to bank assaults

6. 6 fresh Apple iPhone 6, iOS 7 concept designs

5. How to solve Windows 8 crashes

4. Microsoft eyes ditching browser for secure Web apps

7. Windows 8: How to solve the Start button dilemma

8. $500M state pension software system wracked by backlogs

 

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: