Search This Blog

Friday, October 01, 2010

Microsoft's Security Essentials running on 31 million PCs

Google gives URL shortener its own site, touts performance and security | FTC slams shut telephone cramming scam

Network World Security

Forward this to a Friend >>>


Microsoft's Security Essentials running on 31 million PCs
Microsoft's free antivirus software, Security Essentials, has been installed on 31 million PCs in its first year, the company has announced. Read More


WHITE PAPER: Websense

Regulatory Compliance: Value of Data Security Solutions
Amendments to the Information Technology Act, 2000, have created additional and more stringent compliance requirements relating to cyber security, highlighting more than ever the value of data security solutions. Read More Now

WHITE PAPER: HP

Setting Up a Seven-Figure IT Cost Avoidance at JEA
Learn how storage acquisition costs are 67% lower, performance is faster, recovery takes minutes instead of days, and a seven figure cost avoidance lies ahead. Read Now

Google gives URL shortener its own site, touts performance and security
Meet goo.gl - Google's newest websiteURL shorteners have become a ubiquitous presence on the web, largely due to the rise of Twitter. Tinyurl, Bit.ly and the like have come along to make those ugly long URLs look nice and neat in your 140-character Twitter posts. Since they've become so widely used, it only makes sense that the biggest Internet companies would make their own. That's what Google did last December when it introduced a... Read More

FTC slams shut telephone cramming scam
FTC case shuts cramming business, says scammers must return $37 millionThe Federal Trade Commission today said it had a U.S. district court permanently shut the doors of a company it says placed $37 million worth of bogus charges on the telephone bills of thousands of small businesses and consumers for Internet-related services they never agreed to buy. Read More

DuckDuckGo Doesn't Track Or Share Your Web Searches
DuckDuckGo is a search engine that protects your privacy. DDG won't track you, log your searches, or turn you over to law enforcement.We all know that Bing and Google search engines automatically track us, since they have a vested interest in delivering ads. Every time you run a search on Google or Bing, there is search leakage; your search terms and personally identifiable information like your IP address and unique User Agent are stored by the search engines and then passed to the sites you click on after searching. Read More


WEBCAST: Palo Alto Networks

60 Minutes with Security Visionary Nir Zuk
Join Nir Zuk, network security visionary and founder and CTO of Palo Alto Networks, for an interactive online interview with security analyst Mark Bouchard, CISSP. Watch Nir speak about the state of the information security industry. Learn More!

Too little too late? China's rare earth threat prompts US action
Scarcity of rare earth materials could cause future problems in high-tech, military systemsIn the face of China wielding menacing control over 97% of the world's rare earth materials, the US House of Representatives this week passed a bill that would bolster research and development of the key elements and help find substitutions for the materials. Read More

The InfoWorld expert guide to Windows 7 security
How to configure Microsoft's new Windows operating system to beat malware and keep data secure Read More

ZeuS trojan bank-theft scheme extends to the U.S.
More than 60 people will be charged in the U.S. with using the Zeus trojan to steal millions of dollars from U.S. banks as part of a scheme that resulted in similar charges in the U.K. earlier this week. Read More


WHITE PAPER: Cisco

Security in the Cloud
This technology dossier contains four papers that address security considerations in cloud computing. It includes IDG Research results on what IT managers have to say about cloud security, executive viewpoints on blending cloud solutions to optimize security, and a strategy paper that addresses protecting data. Read now!

MIT system helps companies recover from network intrusion
MIT Computer Science and Artificial Intelligence Laboratory researchers will next week detail a system they say will make it easier for companies to recover from security intrusions. Read More

Android Apps More Open Than Users Know
One of the elements of Android that is often touted over iOS and other mobile platforms is that it is open source. The open nature of Android means that vendors can build on and extend the platform, or that developers are free to create apps unfettered by restrictive rules and approval processes. A new report, though, shows that many Android apps take that open nature a bit too far and share sensitive information without the user's knowledge. Read More

Survey: Cloud security still a struggle for many companies
Despite the value many companies see in cloud computing, a lot of you are still afraid of the security implications, according to this year's Global Information Security Survey. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

SLIDESHOWS

Meet RIM's BlackBerry PlayBook
Research in Motions heats up the tablet wars with BlackBerry PlayBook that aims to outshine Apple and Samsung when it comes to business appeal.

A brief history of Android
In this slideshow we'll take you back in time to trace the origins of the Android operating system and show how it rose rapidly to become one of the top operating systems in the mobile world.

MOST-READ STORIES

  1. Red Hat urges patent office to deny most software patents
  2. Many Android apps leak user privacy data
  3. Zeus botnet bank thieves were careless with own security
  4. Professionals: Don't use Facebook and Twitter
  5. Android software piracy rampant despite Google's efforts to curb
  6. Cisco eats its own IPv6 dog food
  7. How to make your cable company hate you
  8. Texting while driving bans don't work, study finds
  9. Fed's IPv6 plan called a "game changer"
  10. The shape of threats to come

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: