Search This Blog

Thursday, May 23, 2013

Why Google taught developers how to hack Glass

  Growing mobile malware threat swirls (mostly) around Android | Study ranks US least riskiest place to open data center
 
  Network World Security

Forward this to a Friend >>>


Why Google taught developers how to hack Glass
Where end-users fear to tread, developers are called. Drawn to the challenge of rooting Android devices that would scare end-users, developers could not resist an invitation to the Google I/O session Voiding Your Warranty: Hacking Glass. Read More


WHITE PAPER: Aerohive

Wireless LAN: Preferred Enabler of BYOD
Bring Your Own Device (BYOD) and its array of wireless devices is becoming the dominant way workers access corporate networks . And it's forced IT leaders need to reexamine how to best provide secure, reliable and cost-effective wireless network access. Read Now

WEBCAST: Trusteer

Security Requirements vs. Operational Challenges
In this webinar, guest speaker Rick Holland, senior analyst serving Security & Risk Professionals at Forrester Research, Inc., will discuss the security and operational challenges associated with advanced malware protection. Learn More.

Growing mobile malware threat swirls (mostly) around Android
Mobile devices are getting hit by a boom in malware similar to the one that hit PCs starting with the rise of the Web, a security software executive said Tuesday. Read More

Study ranks US least riskiest place to open data center
Last year the U.S. was the least riskiest place in the world to open a data center, according to a study released this week. Read More


WHITE PAPER: Tripwire

10 Steps to Risk-based Security Management
Many professionals in information security espouse the belief—and commitment to—"risk based" security management. In fact, according to the latest Ponemon Report on Risk Management, 77% of those surveyed claimed a commitment to it. Learn More

Privacy and penny-pinching points of view about Xbox One
Meet Xbox One which some fans are saying will be a killer; others are underwhelmed and saying it's a disaster. It goes after the TV watchers as well as gamers. Besides gaming, the Xbox One system "will allow users to watch live TV, make group video calls on the TV via Skype, and search the Web." Microsoft boasted, "This is the beginning of truly intelligent TV." Read More

Endpoint Forensics Will Become a Mainstream Cybersecurity Technology
I've written blogs in the past with titles like, "big data security analytics is inevitable." Yes, I know this reads like a sound bite, but I truly believe that we need to collect, process, and analyze terabytes of real-time and historical data in order to detect stealthy cybersecurity events and adjust our security controls accordingly. Read More


WHITE PAPER: F5 Networks

The New Application Delivery Firewall Paradigm
Learn how you can effectively combat these modern attacks with a new firewall paradigm that protects the datacenters and ensures reliability. Learn More!

Blue Coat Systems to acquire security analytics firm Solera Networks
Blue Coat Systems, a provider of Web traffic filtering and business assurance products and services, plans to buy security analytics specialist Solera Networks, which uses data mining techniques to classify network traffic and detect potential security threats. Read More

New Citadel malware variant targets Payza online payment platform
A new variant of the Citadel financial malware is targeting users of the Payza online payment platform by launching local in-browser attacks to steal their credentials, according to researchers from security firm Trusteer. Read More

Will Chinese hackers launch re-tread attacks into surveillance databases?
At a press conference to announce the new Xbox, Xbox One—which is launching later this year—Microsoft promised that you will "have a relationship with your TV." Part of that relationship will include Skype that is coming to Xbox One. Read More

 
 
 

SLIDESHOWS

20 milestones in Ethernet's first 40 years

Reviewing the highlights of Ethernet's first four decades.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Lawyer questions legal ethics of LinkedIn endorsements

2. Dell dumps OpenStack and VMware for public cloud, focuses on private cloud

3. 20 milestones in Ethernet's first 40 years

10. Reporters threatened with CFAA, labeled hackers for finding security holes

8. How VMware will try to shake up the cloud market this week

9. 10 things you may not know about Ethernet

7. What's next for Ethernet?

6. 10 amazing Linux desktop environments you've probably never seen

5. The devious art of cell tower camouflage

4. Smartphones take center stage in two-factor authentication schemes

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: