Tuesday, May 31, 2011

Hidden URLs in phone and tablet browsers

5 top social media security threats | Can you have too much security?

Network World Security Strategies

Forward this to a Friend >>>


Hidden URLs in phone and tablet browsers
Internet users should be extremely cautious before installing upcoming netbook/tablet PC versions of Google Chrome and Mozilla Firefox which hide the URL of Web sites that users visit – a technique known as compact Web page navigation. Read More


WHITE PAPER: Dell

The Business Case for Security Information Management
It is a mistake to assume that information security is solely a technical problem left for IT to solve. This guide is a non-technical discussion of security information management. Learn more.

WEBCAST: Oracle

Oracle Business Intelligence Foundation
Oracle BI Foundation Suite delivers the broadest end to end BI functionality from reporting, dashboards, scorecards, scenario modeling, forecasting to ad-hoc analysis. Register Today!

5 top social media security threats
Social media platforms such as Twitter, Facebook and LinkedIn increasingly are being used by enterprises to engage with customers, build their brands and communicate information to the rest of the world. Read More

Can you have too much security?
Is there such a thing as too much security? Read More

PBS hacked by LulzSec: Lulz Boat Sailed, PBS Failed
Sunday night, after the Public Broadcasting System aired a documentary on WikiLeaks, displeased hacktivists from LulzSec sailed its "Lulz Boat" to PBS servers. The group posted a bogus news story to the PBS's Newshour website, claiming that reports of rapper Tupac Shakur's death in 1996 had been grossly exaggerated. In fact, the news stated that Tupac had been found "alive and well," living in New... Read More


WEBCAST: Oracle

How Oracle Exalogic and Exadata Deliver Extreme Java
View this webcast to learn why Exalogic and Exadata are the definitive engineered platforms for enterprise application and database consolidation, with added advantage of extreme Java and database performance, unmatched reliability and scalability, and cloud-enabling elastic capacity. Register Today!

Memory encryption breakthrough claimed by NC State researchers
Researchers at North Carolina State University claim they've achieved a breakthrough in how encryption can be used in technology called non-volatile main memory, which is seen as an eventual replacement for conventional dynamic random-access memory. Read More

RSA tokens may be behind major network security problems at Lockheed Martin
Lockheed Martin's has "major internal computer network problems," that one security blogger is linking to compromised RSA tokens, according to published reports. Read More

New malware scanner finds 5% of Windows PCs infected
One in every 20 Windows PCs whose users turned to Microsoft for cleanup help were infected with malware, Microsoft said this week. Read More


WHITE PAPER: Quest Software

Transaction Tracing through Complex Web Applications
In this Quest white paper, learn about the components of a transaction as they cross various application domains. Then, discover the difficulty in connecting transaction components for monitoring, why continuously monitoring is key and how a third-party solution simplifies the challenge. Learn more.

Key lessons learned from Sony hack-fest
The relentless cyberattacks against Sony should have businesses planning now what they will do when they, too, run afoul of ideologically motivated adversaries, experts say. Read More

Microsoft downplays IE 'cookiejacking' bug
Microsoft today downplayed the threat posed by an unpatched vulnerability in all versions of Internet Explorer (IE) that an Italian researchers has shown can be exploited to hijack people's online identities. Read More

Cloud CIO: The Two Biggest Lies About Cloud Security
Survey after survey note that security is the biggest concern potential users have with respect to public cloud computing. Here, for example, is a survey from April 2010, indicating that 45 percent of respondents felt the risks of cloud computing outweigh its benefits. CA and the Ponemon Institute conducted a survey and found similar concerns. But they also found that deployment had occurred despite these worries. And similar surveys and results continue to be published, indicating the mistrust about security persists. Read More

Mobile phones are great for phishers, researchers find
Computer users seem to be getting better at spotting fake websites that are trying to steal their passwords, but when it comes to mobile phones, the deck is most definitely stacked against them. Read More

Not even security managers immune to FakeAV infection
Can you believe it? As I sat down this morning to write this column, I got hit by a drive-by download of FakeAV. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from Cisco Subnet: 15 copies of IPv6 for Enterprise Networks. Enter here.

SLIDESHOWS

7 things we love about Drupal 7
Drupal. the open source Content Management System (CMS) used to power everything from personal sites to the White House's Web site, is legendary for its flexibility and power. Here are the best things about it.

MOST-READ STORIES

  1. Windows 1.0: Still playing Reversi after all these years
  2. IE flaw could allow hackers access to accounts
  3. Apple sues teenager who sold white iPhone 4 conversion kits
  4. RSA tokens may be behind network security problems at Lockheed Martin
  5. Skype voice service crashes; users offered fix instructions
  6. Google Wallet: Five things you need to know
  7. Cisco is a top 3 server vendor
  8. Microsoft not to blame for Skype rejecting open source company
  9. Two convicted in U.S. over counterfeit Cisco gear
  10. Insider data theft costs Bank of America $10 million

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_strategies_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment