Search This Blog

Thursday, March 18, 2010

Microsoft, security vendor clash over Virtual PC bug

Network World Security - Newsletter - networkworld.com
Cisco battered by large fall in security market | Malware found on another HTC Magic smartphone

Network World Security

Forward this to a Friend >>>


Microsoft, security vendor clash over Virtual PC bug
A bug in Microsoft's software gives hackers a way to exploit virtual Windows machines which would be attack-proof if they were running on real hardware, a researcher said today. Read More


WHITE PAPER: Compuware

5 Tips for Getting the Best Web App Performance
This eBook, compiled by Network World, explores the pressing issues, from dealing with outages and evaluating performance monitoring services, to the impact of virtualization. Get expert tips to optimize your Web apps. Learn More Now

WHITE PAPER: Sunbelt Software

Protecting Against the New Wave of Malware
This white paper examines why older, traditional antivirus approaches don't work and why a new approach to endpoint security is required to better protect your company from malicious threats. Learn about the scope of the malware problem and strategies that can help you defend against evolving threats. Learn More

Cisco battered by large fall in security market
'Nobody fires you if you buy Cisco' it was once said but it seems somebody should tell the corporate security sector which has deserted the giant in droves in late 2009, new figures show. Read More

Malware found on another HTC Magic smartphone
Traces of the now defunct Mariposa botnet has been found on another HTC Magic from Vodafone in Spain, security company Panda wrote in a blog post on Wednesday. Read More


WHITE PAPER: Polycom

Top Five Benefits of Video Conferencing
From obvious benefits, like reduced travel costs, to a few less apparent advantages, see what Polycom customers, resellers and industry analysts are saying about the power of video conferencing. Read More

Child porn blocked by new 'fingerprint' system
Organisations are being offered an unusual new anti-child porn system that can identify and block real, individual images by comparing them to one of the world's largest databases of such pictures. Read More

FTC member rips into Google's privacy efforts
Several major U.S. Internet companies, including Google and Facebook, need to "step up" and better protect consumer privacy or face tougher penalties from the U.S. Federal Trade Commission, a commissioner said Wednesday. Read More


WEBCAST: Actuate

Discover BIRT.
Understand how BIRT simplifies and speeds to market the development of rich information applications. In this presentation, a technical expert behind BIRT will demonstrate a customer-facing application in action with Flash, Ajax, and JavaScript interactivity. Click Here!

Law enforcement push for stricter domain name rules
Law enforcement officials in the U.K. and U.S. are pushing the Internet Corporation for Assigned Names and Numbers to put in place measures that would help reduce abuse of the domain name system. Read More

Forensics Tools Help Companies Investigate Intrusions Remotely
For global companies, forensics applications provide another weapon in the security arsenal. Read More

Revised cybersecurity bill introduced in Senate
A revised version of a cybersecurity bill first proposed last year was introduced again in the U.S. Senate today, notably without a controversial provision that would have given the president authority to disconnect networks from the Internet during a national emergency. Read More

Which browser is more secure IE8, Safari 4, Firefox 3.5, Chrome 4, or Opera 10?
About two weeks ago I saw a discussion thread on the GIAC Advisory Board that was entitled, "NSS report on browser security (is IE8 or FF more secure?)". Intrigued, I flagged the discussion as something to read when I had time. Well… I got around to reading the thread and while the discussion wasn't the flame war I had hoped, the source for the discussion was interesting enough that I decided... Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

The Future of Big Iron
Do your IT plans include mainframes? Participate in this Aberdeen survey and see how your plans stack up to those of peers in terms of on what core applications are staying on mainframes and where the industry is headed in operating and software architecture. The goal is to get an accurate picture of the opportunity for expanded utilization, the role of 3rd-party support, and overall objectives with respect to distributed, outsourced, heterogeneous and centralized computing paradigms. Aberdeen will also establish a baseline for performance and a set of best practices for improving the efficiency and utilization of mainframe computing technologies. All survey respondents will receive a free copy of the resulting research.

Today from the Subnet communities

Massive giveaway from Cisco Subnet: 50 copies of the Cisco Press CCNP Cert Kits kits are up for grabs. Deadline March 31. NEW! 15 books on Microsoft System Center Operations Manager (OpsMgr) 2007 R2 available, too.

SLIDESHOWS

21 apps Apple doesn't want on your 3.0 iPhone
The following 21 apps today run only on jailbroken iPhones. Some may even prove precursors to features released in future Apple iPhone firmware updates.

10 geeky items you're embarrassed to admit you want
Most of us love gadgets. But there is a certain eye-popping reaction when we find a gadget that speaks to our technological selves. Owning such devices would surely be the subject of teasing from those who deny their inner geek, but it would also be the cause of more than a little envy.

MOST-READ STORIES

  1. Who else wants national broadband?
  2. A new take on cloud security ... from Hitler
  3. Apple sees over 120,000 iPad pre-orders on first day
  4. IE9 proves Microsoft is back in the browser battle
  5. 60% of virtual servers less secure than physical machines
  6. New Cisco Ethernet switches to play a broader video, security roles
  7. 8 things you didn't know about Windows Phone 7
  8. Chambers: 'I did not want to compete against IBM and HP'
  9. Will Google tip the scale toward OpenID?
  10. Simplify Media yanks iPhone apps, promises 'new direction'

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: