Search This Blog

Wednesday, July 14, 2010

Microsoft patches critical bugs in Windows, Office

  Coverity and Armorize link code quality, security analyses | BlackBerry offers users free security app
 
  Network World Security

Forward this to a Friend >>>


Microsoft patches critical bugs in Windows, Office
Microsoft today patched five vulnerabilities in Windows and Office, including a bug hackers have been exploiting for almost a month. Read More


WHITE PAPER: ArcSight

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center

E-GUIDE: Force10 Networks Inc.

Examining Nuances of the Cloud
Choosing the best cloud strategy means understanding the promises and pitfalls of each approach. This Network World eGuide provides expert articles on the nuances between different cloud strategies, best practices on building a hybrid cloud and making sure you have an exit strategy in case the cloud does not work out. Read More Now

Coverity and Armorize link code quality, security analyses
The companies plan to integrate Coverity Static Analysis with Armorize's CodeSecure security analyzer Read More

BlackBerry offers users free security app
BlackBerry maker RIM has shown a new free application that owners can use to track their much-loved smartphones in the event they are lost, stolen, or simply misplaced around the house. Read More


WHITE PAPER: Qualys

12-point checklist outlines key considerations
Discover a 12-point checklist for choosing the best vulnerability management solution for your organization. Read now!

NASA offers $5M prizes for cool robots, satellites and solar spacecraft
NASA today significantly expanded its Centennial Challenges program to include $5 million worth of new competitions to develop robots, small satellites, and solar Read More

Bizarre phone ransom Trojan found by researchers
Researchers have discovered a bizarre piece of Trojan ransomeware which disables programs on infected PCs before demanding victims make an unaccountably small payment to a Ukrainian mobile phone network in return for an unlock code. Read More


WHITE PAPER: Radware

New Threats Require Real-Time Protection
First generation IPS devices match patterns (or "signatures") of known attack vulnerabilities to safeguard networks. However, a significant amount of threats are dynamic and not addressable by static signature-based IPS devices. Read More Now

Security vendor GFI Software acquires Sunbelt Software
GFI Software Tuesday announced it has acquired Sunbelt Software for an undisclosed price. The companies said the goal of the merger is to develop integrated security products for both on-premises use and the cloud. Read More

Bluetooth at heart of gas station credit-card scam
Thieves are stealing credit-card numbers through skimmers they secretly installed inside pumps at gas stations throughout the Southeast, using Bluetooth wireless to transmit stolen card numbers, says law enforcement investigating the incidents. Read More

How to keep Windows XP SP2 safer after Microsoft stops patching
Tuesday marks the end of patches for Windows XP Service Pack 2 (SP2). If you're still running that edition of XP, you can still take steps to protect your PC. Read More

13 essential steps to integrating control frameworks
In recent years, requirements for effective information technology governance programs have increased. Information security and risk management professionals face a continually growing collection of laws, regulations, and industry standards--PCI DSS, Sarbanes-Oxley, HIPAA and Red Flag Rules to mention just a few examples-- each adding to a seemingly endless set of requirements. As organizations attempt to comply with these provisions, the various activities can become confusing, conflicting, and difficult to manage. Read More

 
 
 

Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

SLIDESHOWS

Robocop ran DOS
Virtually no sci-fi or action flick these days is complete without a computer scene showing a few screens of mysterious scrolling text and a 3D wire-frame model. But where does this vaguely tech-looking stuff come from? Well, more often than not, it comes from a Website, app, or startup screen from the real world at the time the movie was made. Read on for some of the most unexpected tech cameos in movies.

Top Russian spy ring technology screw-ups
Alleged Russian spies arrested last month in cities around the United States seemed to be lacking in spycraft and in urgent need of some IT expertise, based on some of the gaffes they made. They also used some technologies effectively. Here is a summary of their efforts as revealed in court filings against them.

MOST-READ STORIES

  1. 8 amazing things you'll do with Windows 8
  2. Newest attack on your credit card: ATM shims
  3. Java supplants IT security as most sought-after tech skill set
  4. SIP trunking: A primer
  5. 15 free enterprise collaboration tools
  6. Desktops gone wild
  7. Consumer Reports and the iPhone 4: Not recommended
  8. How to keep Windows XP SP2 safer after Microsoft stops patching
  9. Complaints mar Google Android App Inventor
  10. iPhone 4 "bursts into flames!" Probably the antenna

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: