Search This Blog

Friday, March 07, 2014

Apple reveals unprecedented details in iOS security

Microsoft plans to patch critical under-attack IE bug next week | Security pros see increase in Meetup-like DDoS extortion

Network World Security

Forward this to a Friend >>>


Apple reveals unprecedented details in iOS security
An updated Apple whitepaper on iOS security delves into an unprecedented amount of detail about the security architecture and features of the company's mobile OS for devices such as the iPhone and iPad. Security professionals and IT consultants are praising both the company's transparency and its approach to protecting iOS devices, Internet security and users' data. Read More


WHITE PAPER: Symantec

Security Requirements for Electronic Health Records
Download this whitepaper to learn about the challenges surrounding the new world of EHR technology, including the requirements that govern protecting confidential patient data online. The report also details the measures that organizations need to start taking now to prepare for the upcoming changes in the healthcare industry. Learn More>>

RESOURCE COMPLIMENTS OF: CSO40 Security Confab + Awards Conference

Register now: CSO Magazine's CSO40 Security Confab
On behalf of Bob Bragdon, Publisher of CSO magazine and CSOonline.com, CSO would like to invite you to register for CSO Magazine's spring 2014 conference – CSO40 Security Confab + Awards, being held March 31 – April 2, 2014 outside Atlanta, Georgia. For more information and to register, please visit: http://www.csoconfab.com/

Microsoft plans to patch critical under-attack IE bug next week
Microsoft will deliver five security updates to customers next week, two tagged as "critical," including one that will quash the open vulnerability in Internet Explorer that hackers have been exploiting since January. Read More

Security pros see increase in Meetup-like DDoS extortion
Meetup, which faced a massive DDoS attack after refusing to pay ransom, is just the latest of a rising number of attacks aimed at extorting money from websites, security experts say. Read More

Network firewalls aren't dead yet
Phil Cummings says network firewalls will continue to be a critical piece of Health Information Technology Services -- Nova Scotia security portfolio for one simple reason: nothing's come along to replace them. Read More

Cisco patches vulnerabilities in small business routers and wireless LAN controllers
Cisco Systems released new firmware versions for some of its small business routers and wireless LAN controllers in order to address vulnerabilities that could allow remote attackers to compromise the vulnerable devices or affect their availability. Read More


WHITE PAPER: PC Connection | Cisco | Intel®

Overcoming the Security Challenges of the Cloud
PC Connection, in partnership with Cisco and Intel®, recently conducted a survey to learn how organizations are using the cloud. In this white paper, you'll learn what you can do to mitigate security concerns and make the most out of the cloud. View Now

New crimeware tool Dendroid makes it easier to create Android malware, researchers warn
A new commercial tool designed to allow cybercriminals to easily transform legitimate Android applications into malicious software has hit the underground market, paving the way for cheap and easy development of sophisticated Android malware. Read More

Report: Half of all exploits target Java
Once upon a time, Microsoft was the favorite target of malware developers. As Microsoft improved the defenses in its software, though, cybercrooks moved on to easier pickings. Adobe was a prime target for a while, but Adobe followed Microsoft's lead and made its software more secure as well. According to data from the 2014 IBM X-Force Threat Intelligence Quarterly Report, the favorite target is now Java. Read More

Skype-based malware shows how 'peculiar' malicious code can be
Malware often does strange things, but this one -- which looked like Skype installed on a corporate domain controller -- was most "peculiar," says Jim Butterworth, a security expert at ManTech International, whose security subsidiary HBGary recently found the custom-designed remote-access Trojan on a customer's network. Read More

NASA: Hubble telescope catches asteroid death
NASA said today that the Hubble Space Telescope snapped what the agency called a never-before-seen break-up of an asteroid in mid-space. Read More


WHITE PAPER: IBM

Simplify and Consolidate Data Protection for Better Results
Learn how IBM Tivoli Storage Manager Operations Center simplifies user experience and speeds problem resolution. Read Now

Target CIO resigns following breach
The retailer announces the resignation after data breaches affecting up to 110 million people Read More

Android security chief elaborates on comments at RSA Conference
Android's lead security engineer Adrian Ludwig reflected privately after his talk at the RSA Conference about the announcements of other companies' security flaws that are always timed to coincide with security conferences. Read More

Jimmy Fallon "Travoltasizes" Microsoft's Cortana
Jimmy Fallon made a quick mention of the digital assistant Microsoft is working on for its smartphone. Supposedly called "Cortana" the assistant is expected to give Microsoft and Apple-like Siri service but according to Fallon, it may have had another name. Oh yeah, Fallon also makes fun of Web-cameras on sharks. Who wouldn't? Read More

9 must-do's if you must stick with Windows XP
Without updates after April 8 Windows XP is expected to fall prey to any number of zero-day attacks for which Microsoft will provide no defense, but there are some things die-hard XP users can do to make their machines safer. Read More


SLIDESHOWS

The 700MHZ spectrum: Who owns what?

700MHZ spectrum holdings, from T-Mobile to Verizon and AT&T to Echostar.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 9 must-do's if you must stick with Windows XP

2. 30 richest techies in the world

3. Inside Cisco's private cloud

4. Cisco revamps enterprise product pricing

5. Network firewalls aren't dead yet

6. Major security flaw threatens Linux users

7. Cisco execs address defective memory component issues with routers, switches

8. SDNs move from theory to reality

9. FIRST LOOK: Cisco Nexus 9000

10. Revisiting Cisco's newest data center


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: