Search This Blog

Thursday, November 04, 2010

Microsoft warns of new Zero-day attack affecting Internet Explorer 6, 7, 8

Lock Down Your Android Devices | How FedEx Improved Security, Eased Access

Network World Security

Forward this to a Friend >>>


Microsoft warns of new Zero-day attack affecting Internet Explorer 6, 7, 8
Today Microsoft released Security Advisory 2458511 to warn Internet Explorer users of a new zero-day attack that Microsoft has seen in the wild. It affects versions 6, 7, and 8, although Microsoft says that the default installations of IE8 make that version of the browser harder to exploit by this issue. Microsoft says: Read More


WHITE PAPER: HP

How Device Reputation Works
From botnet CnC servers to malware depots and phishing sites, cyber threats are growing by the day and with little risk of being caught or prosecuted, they will likely continue to rise. This paper explains how device reputation works and demonstrates the powerful role it can play in preventing attacks. Read now.

WHITE PAPER: Watchguard

Cloud-based Web Security Isn't Hype - It's Here and It Works
Clear threats are rejected at the connection level, eliminating much of the scanning and processing demands on your network. That means both better protection and better performance. Too good to be true? Believe it. Read now!

Lock Down Your Android Devices
Two years ago almost nobody had heard of Android. Now it's nearly ubiquitous among smartphone users, and it's on track to become the most popular mobile operating system in the United States. When it comes to business use, though, Android still has some growing to do. Here's how to keep your Android phones and tablets safe from malware and hackers. Read More

How FedEx Improved Security, Eased Access
By moving to an identification badge-management application, FedEx simplified its ID process from three badges to one while saving money and boosting security. Read More


WHITE PAPER: Tripwire

A Pragmatic Approach to SIEM
In this white paper, security and compliance eWPxpert Dr. Anton Chuvakin explains how to take advantage of this opportunity. Read Now.

Tokenization: Five Things CIOs Need To Know
Data breaches are expensive-they cost an average of $6.75 million per incident, according to one study. One way to reduce the risk is to cut down on the places that handle sensitive data. Enter tokenization. Read More

5 LinkedIn Privacy Settings You Need to Know
Many regard LinkedIn as the "safe" social network--there are no games that jeopardize your privacy, you aren't posting incriminating photos of last weekend's Halloween party and you're not TKTKTKTK. But that's no reason to ignore the privacy and account settings that LinkedIn has in place. Read More


WHITE PAPER: Watchguard

Take Back Control: Increase Security, Empower Employees
Read this white paper to find out how WatchGuard Application Control lets you take back control of your network by keeping more than 1,500 applications in check, including IM, P2P, Facebook, Skype, YouTube, and many more. Read now!

Optimize Your PC, Security Apps 101, Find Folders Fast
Want to clean and optimize your PC? You've probably heard of CCleaner, arguably the world's most popular tool for doing the job. Developer Piriform just released CCleaner 3.0. The big news in this update? A native 64-bit version for use with like editions of Windows. Read More

NASA takes cloud computing to Mars
NASA said its twin Mars rovers Spirit and Opportunity have become the first NASA space mission to use cloud computing for daily mission operations. Read More



Fill out a survey, get rewarded

Get a free Starbucks gift card for participating in a Network World survey about application performance management best practices. Research firm NetForecast is surveying enterprises about APM practices for an upcoming Network World article. The first 100 participants will receive a $5 Starbucks gift card. Click here.

Goodies from the Subnets
We've got SharePoint 2010 training for up to three people from Webucator up for grabs. There's an iPad available, too. Enter to win one!

SLIDESHOWS

The Google Android Quiz
Android OS, with its openness, readily developed applications and flexibility has anchored a new wave of mobile devices that are rapidly gaining popularity. Here's a quiz about the operating system, its devices and history to see how well you really know it. Keep score and rank yourself at the end.

25 hot products from new IT companies
Network World's 25 New IT Companies to Watch are building a broad array of new IT products for the cloud computing and virtualization age. Here's a look at the 25 new IT companies and the technologies they're offering.

MOST-READ STORIES

  1. Father of Firesheep fires away after wild week in Wi-Fi security
  2. TSA: Show us your body or we'll feel you up
  3. Sony BMG rootkit scandal: 5 years later
  4. IT certifications that matter
  5. Testing your destination imagination
  6. Firefox add-on Firesheep brings hacking to the masses
  7. How to protect against Firesheep attacks
  8. Cops: Hacker posted stolen X-rated pics on Facebook
  9. Stormy Peters leaves GNOME: joins Mozilla
  10. Antivirus software didn't help in zero-day malware attack

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: