Search This Blog

Friday, May 31, 2013

Microsoft moving bot-busting fight to the cloud

  Gartner security survey: McAfee up, Trend Micro down | When malware strikes: How to clean an infected PC
 
  Network World Security

Forward this to a Friend >>>


Microsoft moving bot-busting fight to the cloud
Microsoft said Tuesday that it has moved its botnet-fighting capabilities to the cloud, a step that will make its response teams both faster and more effective in fighting hijacked PCs. Read More


WHITE PAPER: Dell Inc.

2013 Next Generation Firewall Security Value Map
Read this case study to learn how ZapFi enabled comprehensive gateway security and granular application intelligence for large-volumes of wireless and VPN traffic. In addition, ZapFi eliminated overhead and latency, by integrating Dell SonicWALL SuperMassive, TZ Series and Global Management System (GMS) solutions. View Now

WHITE PAPER: McAfee

Eight "Must-Have" Firewall Rules
With the torrent of new threats resulting from Web 2.0, it's likely that your existing firewall is leaving you exposed. This checklist should help you understand the advanced features available in next generation firewalls and guide your evaluation process. Read Now

Gartner security survey: McAfee up, Trend Micro down
A Gartner report about the security software market out today shows that No. 2 ranked McAfee enjoyed the most overall growth last year, Trend Micro slipped but stayed No. 3, and Symantec held onto its top spot with 19.6% of the $19.1 billion market. Read More

When malware strikes: How to clean an infected PC
You work hard to protect your PC from the malicious thugs of our digital world. You keep your antivirus program up to date. You avoid questionable Web sites. You don't open suspicious email attachments. You keep Java, Flash, and Adobe Reader up-to-date--or better yet, you learn to live without them. Read More


WHITE PAPER: Cisco Systems

Getting the Most Out of Your Next-Generation Firewall
Trends such as BYOD and the adoption of social media and other grey applications as legitimate business tools have had profound effects on organizations of all sizes. Read Now

Online money laundering bust casts light on Bitcoin
The take-down of Liberty Reserve, which authorities described as a multibillion-dollar online money-laundering operation, raises the question whether Bitcoin could evolve into an alternative for cybercriminals. Read More

Twitter SMS authentication security won't stop attacks, say experts
Twitter's long overdue rollout of two-factor authentication doesn't plug every angle of attack and won't guarantee that customer accounts aren't compromised in future, experts have warned. Read More


WHITE PAPER: Sophos, Inc.

Network protection and UTM Buyers Guide
This buyers guide is designed to help you choose the right solution for your organization. It looks at the factors you should consider when evaluating solutions to ensure you have the protection and functionality you need, both now and as your business evolves. View Now

NASA: Asteroid-based manufacturing not science-fiction
The idea of building a robotic manufacturing facility in space might have been in the realm of a Star Wars, Star Trek or other science fiction story, but like some of the technologies in those tales, reality may soon imitate art. First off, you may recall that NASA is looking for an asteroid weighing about 500 tons that could be moved into within the moon's orbit so astronauts can examine it as early... Read More

Spear phishing paves road for Advanced Persistent Threats
Cyber intrusions that remain undetected for long periods of time and leak information to hackers and online spooks are on the rise, spearheaded by an aptly-named form of spam called spearphishing Read More

Signature-Based Endpoint Security on Its Way Out
Signature-based blacklisting security technologies are losing the battle against malware, says McAfee, which has streamlined its endpoint security offerings to two suites that it says provide next-generation security for all endpoints, whether PCs, tablets or ATMs. Read More

Private retaliation in cyberspace a 'remarkably bad idea'
Despite the growing threat of state-sponsored cyberattacks launched from China and other countries, U.S companies should not be allowed fight back on their own, security experts say. Read More

 
 
 

SLIDESHOWS

The 20 best iPhone/iPad games of 2013 so far

Fish turn into money, sorcerers rule and things get creepy in these iPhone and iPad games.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Look out, Google Fiber -- scientists build 400G connection

2. Microsoft's opening act since Windows 95: Weezer

3. Why teenage girl's smartphone battery breakthrough may never see daylight

10. First look: Gmail's latest redesign

8. The cloud goes global

9. 12 must-play Android games

7. How to integrate Skype with Microsoft Lync

4. Microsoft wheels out 256GB Surface Pro tablet -- in Japan

6. 10 tech patents that should have been rejected

5. Rude and overworked? Blame tech

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: