Tuesday, June 02, 2009

PC Tools Internet Security;

Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by IBM
rule

Dynamic Infrastructure Worldwide Virtual Forum, June 23
While at the Dynamic Infrastructure Worldwide Virtual Forum, you will hear from leading experts on today's IT challenges. We'll demonstrate how your business can dramatically improve productivity through virtualization, energy efficiency and flexible sourcing. We'll also show you how to prepare your infrastructure to address your business needs and to take advantage of emerging capabilities and delivery models such as cloud computing. Register Now

rule

Spotlight Story
PC Tools Internet Security

By Robert Vamosi
PC Tools Internet Security (US$60 for up to three computers for one year as of 5/21/09) offers a decidedly mixed bag of protections. Symantec acquired the security vendor in 2008 to increase its worldwide market share with consumers in new and emerging regional markets. Since the acquisition, PC Tools maintains a separate development operation from Symantec's consumer business unit (responsible for the Norton Internet Security Suite), and its entry in the Internet security suite market comes with strong heuristic malware detection, but it's weaker in other areas such as traditional malware detection. Read full story

Related News:

Top 4 Tips to Fight Off Botnet Denial of Service Attacks
In case you haven’t been paying attention Botnet DDoS attacks passed the 40 Gigabits/sec mark in 2008 according to Arbor Networks. The shear size of today’s Botnets has reached into the mind-boggling realm of 1.9 million bots in a single Botnet. Couple that with the fact that Botnet DDoS attacks are one of the hardest assaults to defend against and you have a real nightmare scenario on your hands. This is why DDoS attacks are the most common method employed by extortionists to attempt to hold online merchants hostage for ransom. It's big business for criminals and business is good.

Obama's cybersecurity chief to be a 'coordinator' not 'czar'
In a speech at the White House last week, President Obama put forward his vision for protecting the nation’s critical IT infrastructure from attack, and announced the new office of Cyber Security Coordinator.

Microsoft warns of DirectX attack
Microsoft warns of DirectX attack on XP, WS2003 in the wild Microsoft Subnet reports about the three vulnerabilities of Microsoft software and the workarounds until the patch is installed.

Turns out data breaches are older than manned flight
What's the oldest data-loss incident on record involving social security numbers? How about health-care industry records? Well, there's no way to know for certain, but the Open Security Foundation's DataLossDB has just concluded a six-week contest that invited amateur sleuths to submit the oldest such loss incidents they could find. The results were announced this morning on the organization's blog.

Dr. Johnston's Security Maxims: Sense and Humor
Having graduate students is like having a thousand sets of eyes and ears: they are always noticing neat stuff and sending pointers that stimulate thought or – as often – cause delighted laughter. Jan Buitron, CISSP, MCSE, ITIL Foundations Certified, Network +, who last appeared in this newsletter in a series of columns in September 2008, sent me a reference to a hilarious and valuable compilation of security maxims by Dr. Roger G. Johnston, PhD, CPP, Section Manager of the Vulnerability Assessments Section in the National Security and Non-proliferation Department of the Argonne National Laboratory.


Evolution of Ethernet
Evolution of Ethernet From 3Mbps over shared coax to 40/100Gbps over fiber…and beyond.

Apple iPhoneys: The 4G edition
Apple iPhoneys: The 4G editioniPhone enthusiasts from around the Web offer their visions for the next-gen iPhone.

Sponsored by IBM
rule

Dynamic Infrastructure Worldwide Virtual Forum, June 23
While at the Dynamic Infrastructure Worldwide Virtual Forum, you will hear from leading experts on today's IT challenges. We'll demonstrate how your business can dramatically improve productivity through virtualization, energy efficiency and flexible sourcing. We'll also show you how to prepare your infrastructure to address your business needs and to take advantage of emerging capabilities and delivery models such as cloud computing. Register Now

rule

Network World's IT Resource Library
Whether you're looking to gear up on one specific topic or you're trying to stay current on several areas, Network World's resource library has what you're looking for. Our comprehensive collection of resources will make your job easier.
Visit Now


Compare Identity Management Products

Get side-by-side product comparisons, buying tips, market trend information, case studies and more with Network World's newly enhanced Identity Management Product Guide.

Click here to visit now.

 

06/02/09

Today's most-read stories:

  1. Nine management apps that won't bust your budget
  2. The rise of personal 'Mi-Fi' hotspots
  3. Windows 7 alluring, but XP is the migration factor
  4. YouTube hit by porn storm
  5. 20 years after Tiananmen, China containing dissent online
  6. Ubuntu Desktop: Plenty of sizzle, not much steak
  7. Microsoft warns of DirectX attack on XP, WS2003 in the wild
  8. Bing: A visual tour of what's new
  9. Obama announces new cybersecurity direction
  10. Top four tips to fight off botnet denial-of-service attack


Network World on Twitter: Get our tweets and stay plugged in to networking news


Everybody says "Do more with less!"
But no one tells you how. We will and it costs nothing to find out at IT Roadmap Conference and Expo. Coming to 10 cities in 09.
Register now, attend free



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment