Wednesday, July 07, 2010

Microsoft Accuses Apple, Google of Attempted Privacy Murder

Microsoft clamps down on software pirates | DefCon contest to spotlight social engineering

Network World Security

Forward this to a Friend >>>


Microsoft Accuses Apple, Google of Attempted Privacy Murder
A Microsoft identity guru bit Apple and smacked Google over mobile privacy policies. Once upon a time, before working for Microsoft, this same man took MS to task for breaking the Laws of Identity. Read More


WHITE PAPER: ArcSight

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center

WHITE PAPER: Qualys Inc.

12-point checklist outlines key considerations
Discover a 12-point checklist for choosing the best vulnerability management solution for your organization. Read now!

Microsoft clamps down on software pirates
Microsoft has clamped down on UK firms selling pirated versions of its software. Read More

DefCon contest to spotlight social engineering
How strong is your schmooze? That is the question participants in an upcoming contest at this year's Defcon event will attempt to answer at the end of July. The Social Engineering CTF (capture-the-flag contest) is sponsored by the group that runs the website social-engineer.org and will ask contestants to gather information and then plan a realistic and appropriate attack vector, according to Chris Hadnagy, one of the site's founders. Read More


DOWNLOAD: Qualys Inc.

Security & Compliance Suite Trial
QualysGuard Security & Compliance Suite Trial The 14-day Trial includes: • Unlimited network mapping and discovery • Unlimited network perimeter scans • PCI Compliance scanning • Web application security scanning • IT security policy creation, scanning and reporting Learn More!

Adobe fails to fully fix PDF bug
An Adobe patch for a well-publicized bug in the company's Reader PDF software doesn't fix the vulnerability, the security researcher who uncovered the flaw confirmed. Read More

Apple Boots Alleged iTunes Hacker: How to Stay Safe
A Vietnamese-based iPhone application developer may have recently bilked unsuspecting iPhone users out of hundreds of dollars in an apparent hack of the iTunes App Store. The apparent scam became public over the July 4th weekend after several news reports that 42 out of the 50 top ranked e-book applications in iTunes were all being sold by a seller named Thuat Nguyen. The rise of Nguyen's apps corresponded with a spike in complaints of iTunes accounts being hacked and overcharged. Read More


WHITE PAPER: Radware

New Threats Require Real-Time Protection
First generation IPS devices match patterns (or "signatures") of known attack vulnerabilities to safeguard networks. However, a significant amount of threats are dynamic and not addressable by static signature-based IPS devices. Read More Now

Natural Disasters and Global Warming Fuel the Malware Flames
Malware and spam developers understand that the easiest way to lure a user into clicking on a link, opening a file attachment, or reading a message is to target hot topics that those users are already interested in and discussing around the proverbial water cooler. AppRiver, a provider of e-mail and Web security solutions, has compiled a report based on the first half of 2010 analyzing the current threat from malware and spam, and highlighting the opportunistic nature of the attacks. Read More

How effective is your file transfer strategy?
The world of file transfer has changed dramatically over the last decade. A growing mobile workforce, increased business-to-business interactions and more stringent security and privacy requirements are causing many organizations to re-evaluate their current file transfer technologies. Read More

Facebook adds new controls for third-party apps
Facebook has revamped the way its users share information with third-party applications and Web sites in an effort to make the process easier, the company said Wednesday. Read More

Study: Advanced threats a growing problem for security
Most organizations have been the target of an advanced threat, according to results of a study released this week by Ponemon Institute and sponsored by NetWitness. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

Computerworld and Network World: Best of Green IT

Computerworld and Network World: Best of Green IT Computerworld and Network World are teaming up to identify the top organizations leading the way with green-IT efforts and the coolest green-IT products. Computerworld will feature two ranked lists in its Oct. 25 issue: Top green-IT end-user organizations and a Top green-IT data center suppliers/vendors. Network World will feature the most effective green-IT products, as cited by survey respondents, in its Oct. 25 issue and online. Please fill out our short survey or forward this link to the person in your company best able to answer questions about IT energy issues. Surveys should be submitted by Thursday, July 1 at 12 noon EST.

SLIDESHOWS

Quiz: Do you know IT security?
Here is a quiz that draws questions from the vast spectrum of security options, including authentication, cryptograpy, firewalls, VPNs and more.

Your Next Laptop: Concept Designs Point the Way
Tomorrow's models may roll up, sport multiple screens or be repositionable, Transformer-style.

MOST-READ STORIES

  1. Many companies distributing open source software don't know it
  2. Cisco wants to be the standard
  3. EMC shuts down online cloud storage service
  4. Verizon LTE + iPhone = iPhone 4G?
  5. Google acknowledges YouTube hack
  6. MIT researchers promise an Internet that's 100x faster and cheaper
  7. What does Kin's fate say for Windows Phone 7?
  8. Cisco advances video agenda with Cius tablet
  9. Is Apple antenna denial?
  10. Russian spy ring needed some serious IT help

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment