Search This Blog

Monday, April 08, 2013

Microsoft's Patch Tuesday for April to address Windows 8 vulnerabilities

  Bitcoin mining malware spreading on Skype, researcher says | Australia charges alleged Anonymous member
 
  Network World Security

Forward this to a Friend >>>


Microsoft's Patch Tuesday for April to address Windows 8 vulnerabilities
Windows 8 and Windows RT are subject to critical vulnerabilities that will be addressed on Microsoft's Patch Tuesday next week, both by virtue of supporting Internet Explorer 10. Read More


WHITE PAPER: Cirba

How to Reduce Processor-Based Software Licensing Costs
Most organizations that license software such as Windows, SQL Server, Oracle Weblogic and Oracle Database on a per processor or per host basis are spending far more than is required. By optimizing VM placements considering licensing, utilization, business and technical policies, organizations can achieve savings of greater than 50%. Learn More

WHITE PAPER: Trusteer

Dealing with Advanced and Targeted Attacks
This whitepaper explains how advanced malware challenges traditional defenses to take advantage of the increased exposure of employee endpoints. It reviews the evolution of advanced targeted attacks and the various approaches used to address them. Learn More.

Bitcoin mining malware spreading on Skype, researcher says
Security researchers from Kaspersky Lab have identified a spam message campaign on Skype that spreads a piece of malware with Bitcoin mining capabilities. Read More

Australia charges alleged Anonymous member
Australian police have charged an unidentified juvenile, who is suspected to be a member of the hacker group Anonymous, on a number of counts related to unauthorized access to computer data. Read More


WHITE PAPER: EMC Corporation

Data Protection Visibility with EMC Data Protection Advisor
With better visibility and insight into a key service delivery area like backup, data protection providers can get better information with less effort—and their clients are the beneficiaries. Learn More

How to hack your own Wi-Fi network
Attempting to "hack" into your own wireless network can help you spot potential Wi-Fi security vulnerabilities and figure out ways to protect against them. Read More

Hack attack by Anonymous vandalizes North Korea's Twitter and Flickr accounts
While North Korea has made some serious-sounding threats about military action against the United States and South Korea lately, the country's looking a bit silly after several of its online accounts were hacked. Read More


WHITE PAPER: PhoneFactor

Phones Become the Leading Multi-Factor Authentication Device
According to a leading analyst firm, phone-based authentication will comprise 61% of the multi-factor authentication market by the year 2014. This paper will address the key drivers for this market shift away from security tokens and includes real-world case studies from organizations that have made the move to phone-based authentication. Learn More

Privacy flap prompts CyanogenMod developers to back down on mandatory info collection
The lead developer of CyanogenMod, one of the most popular third-party versions of Android, has reversed a change that would have removed the ability for users to opt out of data collection, after a determined protest from some CyanogenMod users. Read More

Should U.S. limit China-government influenced IT systems?
New federal restrictions now preclude four U.S. agencies from buying information-technology (IT) systems from manufacturers "owned, directed or subsidized by the People's Republic of China" due to national-security concerns. But is this a smart tactic? Read More

 
 
 

SLIDESHOWS

8 things you might not know about Android

Some lesser-known facts about Google's mobile OS.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. German court invalidates Apple slide-to-unlock patent

2. Google Grim Reaper: The latest killed projects

3. How that 'extra 9' could ward off Zombie Apocalypse

9. BlackBerry details extensive security protection in BlackBerry 10 OS

5. SIP trunking: The savings are there but the transition is complex

6. Microsoft's Patch Tuesday for April to address Windows 8 vulnerabilities

7. Windows 8: How to solve the Start Button dilemma

8. Cisco acquisition highlights interest in small cells

10. Amazon's biggest competitor in the cloud: Salesforce.com?

4. iPad 5 rumor rollup for the week ending April 3

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: