Search This Blog

Friday, August 23, 2013

Cisco patches serious vulnerabilities in Unified Communications Manager

Microsoft's latest screw-ups suggest bigger problems | Poison Ivy, used in RSA SecurID attack, still popular

Network World Security

Forward this to a Friend >>>


Cisco patches serious vulnerabilities in Unified Communications Manager
Cisco Systems has released new security patches for several versions of Unified Communications Manager (UCM) to address vulnerabilities that could allow remote attackers to execute arbitrary commands, modify system data or disrupt services. Read More


WHITE PAPER: Akamai Technologies, Inc.

Demonstrate the Business Value of Security
Justifying the cost of a security can be difficult, no matter how valuable protection may be. In this whitepaper, Forrester Research demonstrates how to calculate the value InfoSec provides. You'll learn how to justify and defend tough financial decisions in terms the business understands. Learn More

RESOURCE COMPLIMENTS OF: LogMeIn

Powerful and secure remote support with LogMeIn Rescue
For companies that want to compete in their industry, improving the customer experience is a top priority. To do that, having an on-demand remote support solution is essential. That's why companies around the world choose LogMeIn Rescue to provide powerful, secure support of any device, anytime, anywhere. Rescue offers a simple, reliable interface packed with all the features technicians want. Check out LogMeIn Rescue to learn more and start your free trial today.

Microsoft's latest screw-ups suggest bigger problems
If Microsoft has screwed up worse than this, I don't recall it. The company had to recall six botched fixes issued on Patch Tuesday and suffered outages for SkyDrive and Outlook.com that ran for multiple days. Read More

Poison Ivy, used in RSA SecurID attack, still popular
A malicious software tool perhaps most famously used to hack RSA's SecurID infrastructure is still being used in targeted attacks, according to security vendor FireEye. Read More


WEBCAST: Egnyte

The Benefits of Hybrid Cloud Sharing
Security. Scalability. Control. These are just some of the many benefits of enterprise cloud file-sharing that you'll discover in this KnowledgeVault, packed with short videos, white papers and demos. View Now!

Motorola uses NFC to enable touch-to-unlock for smartphones
Motorola has developed a middle-ground between security and convenience, with a body-worn NFC-based tool that unlocks smartphones on contact. Read More

Teen beauty queen and baby spied on via hacked cameras
For people who believe hijacking a webcam is mostly a tinfoil hat theory, then they should listen to the recently crowned Miss Teen USA. Read More


WHITE PAPER: Cisco Wi-Fi Challenge NWW Jun-Aug13

Cisco Connected Mobile Experiences
Whether you are in retail, hospitality, healthcare, transportation, or another industry, keeping and attracting customers is crucial to the success of your organization. Cisco Connected Mobile Experiences can help you improve customer loyalty and increase revenue. Learn more.

10 greatest superheroes of high tech
The Hulk, Professor X, Iron Man -- the superhero alter egos of today's top tech leaders revealed! Read More

IT security experts share their tips for managing vendors
Have you ever thought about asking a vendor what their solution doesn't do well? This isn't a trick question, but it is a way to see how honest a potential new vendor is willing to be with you. Members of the Wisegate professional networking group offer their tips on how to manage vendors to your benefit. Read More

Federal courts warn of increased jury duty scams
Another round of scammers using missed jury duty as a way to grab your personal information is making its way around parts of the country, according to a warning issued this week by the US Federal Court system. Read More


SLIDESHOWS

Celebrating Unix heroes

This presentation features the early Unix pioneers and their contributions to the computer industry.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Here's what can happen at Rackspace when it's your birthday

2. CCIE turns 20: How Cisco transformed itself and the IT world

3. The last days of Unix

4. 5 steps Microsoft can take to beef up Windows Phone 8 market share

5. Can the U.S. Postal Service find a future running a gov't cloud-based authentication service?

6. iPad 5 rumor rollup for the week ending Aug. 20

7. 7 IT security skills certifications on the rise

8. Next up for WiFi

9. Attackers use Ramnit malware to target Steam users

10. 5 big things to watch for at VMworld


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: