Search This Blog

Thursday, September 05, 2013

Microsoft Research: Secret tags in 3-D printed objects, hooked to the Internet of Things

Quick look: NASA's ambitious asteroid grabbing mission | APT malware NetTraveler learning new tricks

Network World Security

Forward this to a Friend >>>


Microsoft Research: Secret tags in 3-D printed objects, hooked to the Internet of Things
While people ponder why Microsoft's Nokia bid is either great or terrible for the company's future, Mashable pointed to five Nokia patents that Microsoft should pursue to "get creative with future Nokia phones and bring some real innovation back to the mobile marketplace." The shape-shifting phone and kinetic energy harvester to let motion keep the battery charged are cool, but Microsoft has had plenty... Read More


WEBCAST: IBM

IBM Intelligent Investigation Manager: Online Product Demo
Intelligent Investigation Manager optimizes fraud investigation and analysis and it dynamically coordinates and reports on cases, provides analysis and visualization, and enables more efficient and effective investigations. Learn More.

WHITE PAPER: Citrix

10 Reasons to Strengthen Info Security with Virtualization
New ways of working call for new ways of managing risk. Mobility, flexwork, BYOD and increased collaboration across organizations have changed the risk profile and undermine existing IT architectures. This paper describes how desktop virtualization can help regain control and reduce risk without sacrificing business productivity and growth. Learn More

Quick look: NASA's ambitious asteroid grabbing mission
NASA is developing plans for space mission to visit an asteroid Read More

APT malware NetTraveler learning new tricks
Advanced Persistent Threat exploits Java vulnerabilities, embraces watering hole technique, says researcher Read More


WEBCAST: IBM

Fighting Fraud Videos: IBM Intelligent Investigation Manager
Short videos about IBM Intelligent Investigation Manager (IIM) for Fraud. IIM optimizes the investigation of fraud for customers across many industries in both the commercial and public sector space. Learn More.

Lookout security for Samsung Knox smartphones
Samsung Knox smartphones will include mobile security software from Lookout to protect business users from mobile threats, the San Francisco company said Tuesday. Read More

Two sentenced to prison for point-of-sale credit card theft
Two Romanian men were sentenced Wednesday to serve prison sentences for remotely hacking into hundreds of U.S. merchants' computers and stealing payment card data, the U.S. Department of Justice said. Read More


WHITE PAPER: Citrix

Empowering Information Security with Desktop Virtualization
IT faces an uphill battle to manage and protect enterprise applications. To control risk across the diverse computing landscape, organizations must centralize control of enterprise Windows applications, ensuring that only authorized users have access. This paper describes how desktop virtualization offers IT a powerful solution. View Now

Getting kids used to surveillance
Read More

FireEye offering APT-detection service to notify customers of stealthy attacks
FireEye today announced it has started providing a threat-detection and notification service called Oculus intended to warn the enterprise security manager whenever targeted attacks seek to undermine the network for cyber-espionage purposes. Such attacks are often called "advanced persistent threats," and may be attempts by nation states or their agents to penetrate a company to steal sensitive information, such as intellectual property. Read More


SLIDESHOWS

Top tech hoarders: 15 companies with huge cash piles

Apple, Microsoft, Google and Cisco are flush with cash, and so are many other tech companies.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. IBM discovers its inner Kickstarter via enterprise crowdfunding

2. Top tech hoarders: 15 companies with huge cash piles

3. Amazon hiring 'top secret' IT staff as it fights for CIA work

4. IT hiring: Your text resume is sooo last century

5. A response to Padma Warrior's "Limitations of a software-only approach to data center networking"

6. Best tools for protecting passwords

7. Linux and desktop environments: Change is uncomfortable

8. Could this be Cisco's Internet of Everything core switch/router?

9. What does Microsoft's Nokia move mean to Apple?

10. 10 sorriest technology companies of 2013


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: