Tuesday, February 02, 2010

Windows 7 Tips: Best Security Features

Google Hot Search a good tool for spreaders of malware and their adversaries | Military's robotic pack mule comes to life for $32M

Network World Security Alert

Forward this to a Friend >>>


Windows 7 Tips: Best Security Features
Do you understand and use the new security features in Windows 7? From encryption to malware fighters, here's a look at the key Windows 7 tools that keep enterprise and home PCs safe and secure. Read More


WHITE PAPER: WatchGuard

Avoid Compliance Violations
Protecting confidential data is serious business. Failure may result in fat fines and even jail time - not to mention damage to your brand. WatchGuard's easy-to-use, all-inclusive email and web secure content and threat prevention appliances offer a complete data protection solution. Click here.

WHITE PAPER: Trend Micro

Effectively Deal with Security Threats in Real-Time
Eliminate costly and time-consuming manual security processes with a network security overwatch layer. Raise the bar on security protection within your organization. Find out why an overwatch layer should be part of your best practice security requirements. Read now.

Google Hot Search a good tool for spreaders of malware and their adversaries
Google Hot Search topics are turning out to be a useful tool for security researchers at SonicWall who are trying to find URLs for malicious Web sites as well as signatures to help block the malware they contain. Read More

Military's robotic pack mule comes to life for $32M
What kind of robot will automatically follow a leader, carry 400 lbs of military gear, walk 20 miles in all manner of weather and go 24 hours without refueling? Read More

Cloud security: Try these techniques now
For Logiq³ Inc., the decision to go with a cloud-based provider of IT infrastructure as a service (IaaS) was a matter of cost and flexibility. Read More


WHITE PAPER: Sophos

Windows 7 security
With the public release of Windows 7 debates and discussions have been raging on the security improvements in the new platform, and some potential problems have also emerged. In this white paper, we run through the most significant changes and additions, and look at what they might mean to users and administrators. Read now.

Botnet targets major Web sites with junk SSL connection
More than 300 Web sites are being pestered by infected computers that are part of the Pushdo botnet, according to security researchers. Read More

NASA has tons of cool space technologies that may never get to space
It will be a question of money over priorities. NASA is expected to release its budget for the next year and it doesn't look good for some ongoing projects – the Ares heavy lift rocket likely the biggest cut. If further manned exploration of the moon is significantly delayed or nixed altogether, what does that mean for the myriad technologies NASA already has in development? Here's a look at some of the best NASA technology currently in development that might never get to space. Read More

Fact, fiction and the Internet
In their simplest form, many social networking sites are not much more than online diaries. Whether you're thinking of Bridget Jones or Adrian Mole, Alan Clark or Samuel Pepys, most of us realize that a diary is just someone's personal view, and not a reliable source of indisputable information. Most of us except for financial institutions, that is, or so it appears. Read More


WHITE PAPER: Tripwire

FISMA Prescriptive Guide
Learn how Tripwire helps federal agencies, as well as the organizations and contractors that store, process or transmit federal information. The FISMA Prescriptive Guide contains case studies from three fictional federal agencies, each capturing the perspective of a key stakeholder in the FISMA compliance process. Click here.

GAO calls for more testing of whole body scanners
A Government Accountability Office report this week called on the Transportation Security Administration to ensure that the controversial Whole Body Imager technologies the agency is planning on deploying at airports nationally first undergo thorough operational and vulnerability testing. Read More

Bugs & Fixes: Adobe Reader phishing scam
Want to avoid becoming the victim of a phishing scam? It's usually easy, because most scammers are too inept or too lazy to do a decent job of the deception. Case in point: I received an e-mail this week, purportedly from Adobe, announcing "a new version of PDF Reader/Writer." (Even though it was Windows-only software, the general advice regarding phishing applies to Mac users as well.) Read More

Internal data breaches a rarity, study finds
Internal data breaches might keep CSOs awake at night, but they appear to be a rare event, a university analysis of reported UK compromises has found. Read More

77% of web users targeted by phishing scams
More than three quarters (77 percent) of web users have been targeted by an online phishing scam, says CPP. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

New giveaways! Win a year's worth of 24/7 video training from ClipTraining. Win books on WS2008 R2, Cisco WAAS and the CCIE. Deadline Jan. 31. Plus: On Cisco Subnet: Are two routers enough to study for the CCNA? On Microsoft Subnet: AxCrypt: Open Source tool for encrypting files; On Google Subnet Google's reports blockbuster Q4, modest FY09.

SLIDESHOWS

12 years of big-time Apple innovations
From the iMac to the iPad, here are the biggest releases of the second Steve Jobs era.

10 Gigabit data center switch shootout
We tested six top-of-rack data center switches 10 ways to Sunday.

MOST-READ STORIES

  1. How the heck did Stephen Colbert get an iPad?
  2. Google joins the 'kill-IE6' campaign
  3. Seven social SharePoint apps built in a week
  4. Microsoft exceeds goal of 5,000 layoffs
  5. 'WiMAX 2' coming in 2011?
  6. Apple iPad could give Microsoft fits
  7. Brocade BCNE most valuable cert on earth
  8. Bank of America downtime torments customers once again
  9. How many virtual machines fit on your server?
  10. Why project management certifications matter

Network World on Twitter? You bet we are

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Update your profile | Terms of Service/Privacy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

Copyright Network World, Inc., 2010

Network World, Inc.,, 492 Old Connecticut Path, Framingham, MA 01701


No comments:

Post a Comment