Monday, July 26, 2010

Cisco study warns against "FarmVille"

  Certified Lies: Big Brother In Your Browser | Town official doubly insulted by spyware allegation
 
  Network World Security

Forward this to a Friend >>>


Cisco study warns against "FarmVille"
If your employees are playing popular Facebook games at work - and undoubtedly, some of them are - they are opening up malware avenues for hackers and cybercriminals, according to Cisco. This is just one of the findings of a midyear security report delivered by Cisco this week that reiterated earlier conclusions on social media, virtualization, cloud computing and mobile device use are opening up new... Read More


REPORT: Riverbed

Gartner: Magic Quadrant Report
Riverbed positioned in Leaders quadrant of 2009 Gartner Magic Quadrant for WAN Optimization Controllers. In this report, Gartner helps organizations interested in WAN Optimization Controller capabilities truly understand their options. Read now!

WHITE PAPER: MessageLabs

The Wild, Wild Web: How to Ensure 360-Degree Border Security
Managing the security and availability of Web, email, and IM is complex. This paper will discuss the modern threat of blended attacks from web, email and IM. and highlight how a comprehensive hosted solution by Symantec Hosted Services can secure your networks from these threat vectors. Read Now

Certified Lies: Big Brother In Your Browser
Read More

Town official doubly insulted by spyware allegation
How dare you accuse me of being a stumblebum of a spy? That's essentially the indignant reaction of Sturbridge, Mass. selectmen Tom Creamer to fellow board member Scott Garieri's allegation that Creamer intentionally sent him a spyware-laden e-mail. Here's the setup from a story in the Worcester (Mass.) Telegram & Gazette: Read More

Virus writers are picking up new Microsoft attack
The Windows attack used by a recently discovered worm is being picked up by other virus writers and will soon become much more widespread, according to security vendor Eset. Read More


WHITE PAPER: Palo Alto Networks

Re-Inventing Network Security
Enterprise networks and applications have evolved but security infrastructure has not. Learn why application visibility and control (regardless of port, protocol, or encryption) are critical for preventing increasingly sophisticated threats that target enterprise users and data. Read now!

Google pushed to name names over Wi-Fi data collection
Google is being urged to hand over the names of its engineers that created a code, which was accidentally used by the search engine to collect information from unsecured Wi-Fi networks. Read More

12 Top Spy Gadgets
Spies are everywhere these days, from the 10 Russian agents nabbed recently here in the United States to the more glamorous Hollywood variety, such as is Angelina Jolie. In the movie Salt, Jolie plays Evelyn Salt, a CIA officer accused of being a Russian spy. Read More

NASA satellite spots Buckyballs bouncing in space
Astronomers using NASA's Spitzer Space Telescope say they have spotted large soccer-ball-shaped carbon molecules known as "Buckyballs," in Read More


E-GUIDE: Force10 Networks Inc.

Examining Nuances of the Cloud
Choosing the best cloud strategy means understanding the promises and pitfalls of each approach. This Network World eGuide provides expert articles on the nuances between different cloud strategies, best practices on building a hybrid cloud and making sure you have an exit strategy in case the cloud does not work out. Read More Now

Quick Poll: How Important Is Facebook Privacy to You?
Facebook, which just recently reached 500 million members, has become a daily ritual for many of us. We give the site information about ourselves, about our likes and dislikes, and about the people we choose as friends. Over time, all of that data collects on Facebook's servers. But Facebook, in many people's view, has played fast and loose with our data, marking much of it as "public" and giving its app-developer and advertising partners access to some of it. Read More

Shortened URL spam shows big rise
The tendency of spammers to use shortened URLs to evade detection has gone from last year's clever exploit to this year's mainstream tactic, MessageLabs has reported. Read More

IT departments swamped by consumer devices
IT departments are losing their technological grip as employees increasingly dictate which devices and applications get bought and used by businesses, a new study has found. Read More

Safari Browser Hack Reveals AutoFill Security Concerns
A security researcher has revealed a weakness in Apple's Safari Web browser which can be exploited by an attacker to extract sensitive personal information. The Safari vulnerability is a little more severe, but the issue illustrates the underlying privacy and security concerns with AutoFill in general. Read More

 
 
 

Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

SLIDESHOWS

Say what?
Earlier this month, Microsoft's chief operating officer made a statement that sent everyone's jaws a-dropping. "It looks like the iPhone 4 might be their Vista, and I'm OK with that," he said during a keynote speech at the company's annual partner conference. It got me thinking about quotes that have and will go down in history from the industry's most famous executives. Can you guess who made the following statements?

15 summer vacation ideas for geeks
From Star Trek and Space Camp to baseball minutiae, vintage video games, anime, pirates, Harry Potter and They Might Be Giants, there's a vacation option for any type of geek this summer.

MOST-READ STORIES

  1. Town official doubly insulted by spyware allegation
  2. BlackBerry Apps: Four Types to Avoid
  3. Couple charged in $40M theft of GM hybrid car tech
  4. Rap videos are making Cisco seem hip again
  5. Avaya CEO on how to win over Nortel customers
  6. Apocalypse: 52% of CIOs Plan to Blow Up IT Groups
  7. Bare-metal desktop hypervisors: A primer
  8. Microsoft signs big licensing deal for Arm chip technology
  9. Fake femme fatale shows social network risks
  10. Is open source Snort dead? Depends who you ask

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment