Thursday, May 28, 2009

Latest Kaspersky mobile software wipes data via SMS

Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Avaya
rule

Unified Communications: An SMB Example
In this live event on June 11 2009 1 PM ET / 10 AM PT, Jason Snook, IT director for Mindwave Research, will describe why his small-to-medium size business took the leap into unified communications. He'll talk about how UC has measurably improved Mindwave's bottom line, while providing superior business communications for both the company's customers and home-based workers.Join Us.

rule

Spotlight Story
Latest Kaspersky mobile software wipes data via SMS

By Jeremy Kirk
Kaspersky Lab's latest mobile security software due to be released next week can wipe data with a text message command even if a thief has swapped out the phone's SIM card. Read full story

Related News:

Malware-fighting firewalls miss the mark
In the beginning was the firewall, and it was pretty good. A big box of rules that sat between your network and the evils of the Internet, the firewall examined ports and protocols to decide which packets got in and which were barred at the door. Then things got, as things often do, complicated. New threats came sneaking in on trusted protocols, ports and protocols became tangled, and looking inside packets became just as important as noting their source, destination, and type.

InfoExpress latest NAC vendor to push services
InfoExpress is introducing a managed network access control service designed to reduce the ongoing costs of network access protection and provide better technical support than many businesses could afford in-house. The Compliance, Authorization, and Rogue Enforcement (CARE) service is based on InfoExpress's CyberGatekeeper software running on hardware owned by customers but managed via VPN by InfoExpress.

Why is NAC so confusing?
Standards, definitions, competition...there's lots of reasons. Among them: People have different definitions of NAC, separate standards are being developed, alliances among vendors are complex, the technology itself can be implemented in many ways and some of it is still only on talk.


Evolution of Ethernet
Evolution of Ethernet From 3Mbps over shared coax to 40/100Gbps over fiber…and beyond.

Apple iPhoneys: The 4G edition
Apple iPhoneys: The 4G editioniPhone enthusiasts from around the Web offer their visions for the next-gen iPhone.

Sponsored by Avaya
rule

Unified Communications: An SMB Example
In this live event on June 11 2009 1 PM ET / 10 AM PT, Jason Snook, IT director for Mindwave Research, will describe why his small-to-medium size business took the leap into unified communications. He'll talk about how UC has measurably improved Mindwave's bottom line, while providing superior business communications for both the company's customers and home-based workers.Join Us.

rule

EMA: Refining privilege access security.
Close the security gaps in high-privilege access control and authentication by selecting the right security products for the job. This whitepaper, "Resolving the Privilege Management Paradox," details how. EMA outlines how to find products that offer strong shared access management, better control and clear visibility and multifactor authentication.
Click to download.


DNS news and tips
DNS is not secure and is extremely vulnerable. DNS is at the core of every connection we make on the Internet. While some servers are indeed vulnerable, because of inadequate management or knowledge, the real threat is from the protocol itself and how data is easily subverted or faked as it moves around the internet.
Receive the latest DNS news and tips

 

05/28/09

Today's most-read stories:

  1. Stimulus bill to provide 'windfall' for wireless providers
  2. Are you ready for Mi-Fi?
  3. YouTube hit by porn storm
  4. Microsoft removes Windows 7's "Crippleware" three-app limit
  5. Verizon: Incompetent training or corporate indifference?
  6. Malware knocks out U.S. Marshals Service network
  7. Ex-Microsoftie: Free software will kill Redmond
  8. Huawei moves up in networking's big leagues
  9. Cisco enhances routers, switches for collaboration
  10. Want to friend the feds?


Network World on Twitter: Get our tweets and stay plugged in to networking news


Metzler: 2009 Handbook of Application Delivery
Successful IT organizations must know how to make the right application delivery decisions in these tough economic times. This handbook authored by WAN expert Jim Metzler will help guide you.
Download now



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment