Search This Blog

Tuesday, February 11, 2014

Microsoft adds critical IE, XP fixes to Tuesday's patch slate

Elon Musk sidekick, ex-Juniper exec leads new batch of security startups | 5-year cyberespionage op hit organizations in 30 countries

Network World Security

Forward this to a Friend >>>


Microsoft adds critical IE, XP fixes to Tuesday's patch slate
Microsoft on Monday unexpectedly added two more critical security updates to the list it will deliver tomorrow, including one for all versions of Internet Explorer and another for the soon-to-be-retired Windows XP. Read More


WHITE PAPER: 8x8, Inc

Gartner's Unified Communications as a Service Report
See what Gartner Inc., the world's leading information technology research and advisory firm, has to say about choosing the right Unified Communications solution for your business. Gartner's Magic Quadrant compares 16 of the leading UCaaS providers and names 8x8 a leader based on completeness of vision and ability to execute. Learn more >>

RESOURCE COMPLIMENTS OF: CSO40 Security Confab + Awards Conference

Register now: CSO Magazine's CSO40 Security Confab
On behalf of Bob Bragdon, Publisher of CSO magazine and CSOonline.com, CSO would like to invite you to register for CSO Magazine's spring 2014 conference – CSO40 Security Confab + Awards, being held March 31 – April 2, 2014 outside Atlanta, Georgia. For more information and to register, please visit: http://www.csoconfab.com/

Elon Musk sidekick, ex-Juniper exec leads new batch of security startups
It's already been a prolific year for new IT security companies, and now Bitglass, Spikes Security and Cybereason are making their debuts this month. Read More

5-year cyberespionage op hit organizations in 30 countries
A cyberespionage operation that used highly sophisticated multi-platform malware went undetected for more than five years and compromised computers belonging to hundreds of government and private organizations in more than 30 countries. Read More


WHITE PAPER: IBM

Streamline Data Protection with Storage Manager
IBM Tivoli Storage Manager (TSM) has been an industry-standard data protection solution for two decades. But, where most competitors focus exclusively on Backup and Restore, TSM is a far more comprehensive data-protection solution. Read Now

Microsoft offers multifactor authentication to all Office 365 users
Microsoft is offering multifactor authentication free as an option to all users of its Office 365 suite, a hosted set of Microsoft Office tools and applications. Read More

Snapchat vulnerability can be exploited to crash iPhones, researcher says
A vulnerability in Snapchat allows attackers to launch denial-of-service attacks against users of the popular photo messaging app, causing their phones to become unresponsive and even crash. Read More


WHITE PAPER: IBM

Pay-as-you-Grow Data Protection
IBM Tivoli Storage Manager Suite for Unified Recovery gives small and medium businesses the opportunity to start out with only the individual solutions they need, and add new functionalities as they grow. Read Now

DARPA seeks the Holy Grail of search engines
The scientists at DARPA say the current methods of searching the Internet for all manner of information just won't cut it in the future. Today the agency announced a program that would aim to totally revamp Internet search and "revolutionize the discovery, organization and presentation of search results." Read More

Good News and Bad News on Cybersecurity Priorities and Spending in 2014
With the Winter Olympics in full-swing, the cybersecurity community anxiously awaits another global event, the 2014 RSA Conference. Like Sochi, the RSA Conference comes with its own controversy, but I still anticipate that most of the global information security glitterati will be in San Francisco two weeks hence. Read More

Solving the Credit-Card Security Challenge
One of the key items on my 2014 prayer list is security. While I continue to believe that we really can address security to a very great (but, of course, not absolute) degree, we simply do not. Maybe it's the fact that the cost of a breach can be easily shifted to the victim, or laziness or ignorance on the part of system designers, engineering managers, developers, and marketers, to say nothing of... Read More

INSIDER
Ransomware like Cryptolocker uses Bitcoin, other virtual currencies for payment
Attackers use malware to hold personal data hostage until victims shell out money to get it back. Here's how to prevent it from happening to you Read More


SLIDESHOWS

Steve Ballmer's retirement plans

The retired Microsoft CEO is now ready to ride off into the sunset. But what will he do?

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. FIRST LOOK: HP takes giant leap in server design

2. LA building's lights interfere with cellular network, FCC says

3. Hackers try to hijack Facebook, other high profile domains through domain registrar

4. Target breach happened because of a basic network segmentation error

5. Apple's iBeacon turns location sensing inside out

6. 25 Valentine's Day gifts for geeks at heart

7. California bill proposes mandatory kill-switch on phones and tablets in 2015

8. Cisco reaches agreement with Innovatio over Wi-Fi patents

9. Big Data skills pay top dollar

10. How the U.S. can avoid becoming a 'third-world country' in broadband


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: