Search This Blog

Tuesday, May 31, 2011

5 top social media security threats

Can you have too much security? | Hidden URLs in phone and tablet browsers

Network World Security

Forward this to a Friend >>>


5 top social media security threats
Social media platforms such as Twitter, Facebook and LinkedIn increasingly are being used by enterprises to engage with customers, build their brands and communicate information to the rest of the world. Read More


WHITE PAPER: Dell

The Business Case for Security Information Management
It is a mistake to assume that information security is solely a technical problem left for IT to solve. This guide is a non-technical discussion of security information management. Learn more.

WHITE PAPER: Dell

IT Managers Face Security Challenges with Mobile Devices
A recent IDG survey reveals data security is the top barrier to supporting employees' mobile devices. Read more

Can you have too much security?
Is there such a thing as too much security? Read More

Hidden URLs in phone and tablet browsers
Internet users should be extremely cautious before installing upcoming netbook/tablet PC versions of Google Chrome and Mozilla Firefox which hide the URL of Web sites that users visit – a technique known as compact Web page navigation. Read More

Memory encryption breakthrough claimed by NC State researchers
Researchers at North Carolina State University claim they've achieved a breakthrough in how encryption can be used in technology called non-volatile main memory, which is seen as an eventual replacement for conventional dynamic random-access memory. Read More

Key lessons learned from Sony hack-fest
The relentless cyberattacks against Sony should have businesses planning now what they will do when they, too, run afoul of ideologically motivated adversaries, experts say. Read More


WHITE PAPER: F5 Networks

Manageable Application Security
Investments in security solutions have to provide a clear value, which equals additional time spent collecting and documenting proof of this value. The latest version of F5 BIG-IP Application Security Manager(tm) (ASM), v10.1, addresses information overload and the need for agility in implementation. Learn more!

Driving? 1 in 5 American drivers inept on the road
These stats are scary, though not surprising if you do any amount of driving: 1 in 5 drivers on the road today cannot meet the basic requirements to get a driver's license, meaning that nearly 37 million American drivers - roughly 18%- would not pass the written drivers test if taken today. Read More

New malware scanner finds 5% of Windows PCs infected
One in every 20 Windows PCs whose users turned to Microsoft for cleanup help were infected with malware, Microsoft said this week. Read More

Microsoft downplays IE 'cookiejacking' bug
Microsoft today downplayed the threat posed by an unpatched vulnerability in all versions of Internet Explorer (IE) that an Italian researchers has shown can be exploited to hijack people's online identities. Read More

Cloud CIO: The Two Biggest Lies About Cloud Security
Survey after survey note that security is the biggest concern potential users have with respect to public cloud computing. Here, for example, is a survey from April 2010, indicating that 45 percent of respondents felt the risks of cloud computing outweigh its benefits. CA and the Ponemon Institute conducted a survey and found similar concerns. But they also found that deployment had occurred despite these worries. And similar surveys and results continue to be published, indicating the mistrust about security persists. Read More


WHITE PAPER: F5 Networks

Secure iPhone Access to Corporate Web Applications
This technical brief describes how the BIG-IP Edge Portal app for iOS devices provides simple, streamlined access to web applications that reside behind BIG-IP APM, without requiring full VPN access, to simplify login for users and provide a new layer of control for administrators. Learn More!

Not even security managers immune to FakeAV infection
Can you believe it? As I sat down this morning to write this column, I got hit by a drive-by download of FakeAV. Read More

RSA tokens may be behind major network security problems at Lockheed Martin
Lockheed Martin's has "major internal computer network problems," that one security blogger is linking to compromised RSA tokens, according to published reports. Read More

PBS hacked by LulzSec: Lulz Boat Sailed, PBS Failed
Sunday night, after the Public Broadcasting System aired a documentary on WikiLeaks, displeased hacktivists from LulzSec sailed its "Lulz Boat" to PBS servers. The group posted a bogus news story to the PBS's Newshour website, claiming that reports of rapper Tupac Shakur's death in 1996 had been grossly exaggerated. In fact, the news stated that Tupac had been found "alive and well," living in New... Read More

The hubris of years: IT prowess can't be measured only by time on the job
I've been doing quite a bit of interviewing lately (again) and there's one thing that really smacks me in the face whenever I do this.  And that is how much everyone seems to prize how long they've been doing something over how well they do it.  And in fact, when I'm giving my tech screenings, the number of times I ask someone a fairly easy question that they can't answer is staggering.  Now, I'm... Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from Cisco Subnet: 15 copies of IPv6 for Enterprise Networks. Enter here.

SLIDESHOWS

7 things we love about Drupal 7
Drupal. the open source Content Management System (CMS) used to power everything from personal sites to the White House's Web site, is legendary for its flexibility and power. Here are the best things about it.

MOST-READ STORIES

  1. Windows 1.0: Still playing Reversi after all these years
  2. IE flaw could allow hackers access to accounts
  3. Apple sues teenager who sold white iPhone 4 conversion kits
  4. RSA tokens may be behind network security problems at Lockheed Martin
  5. Skype voice service crashes; users offered fix instructions
  6. Google Wallet: Five things you need to know
  7. Cisco is a top 3 server vendor
  8. Microsoft not to blame for Skype rejecting open source company
  9. Two convicted in U.S. over counterfeit Cisco gear
  10. Insider data theft costs Bank of America $10 million

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: