Monday, June 13, 2011

Microsoft slates hefty Patch Tuesday, to fix 34 flaws next week

Apple iCloud: How do you stay secure with this thing? | Turkish government sites targeted by Anonymous

Network World Security

Forward this to a Friend >>>


Microsoft slates hefty Patch Tuesday, to fix 34 flaws next week
Microsoft today said it will issue 16 security updates next week to patch 34 vulnerabilities in Windows, Internet Explorer (IE), Office, SQL Server and other products. Read More


WHITE PAPER: Diskeeper Corporation

Best Practices for Data Performance on Storage Area Networks
Because SANs work at a storage layer underneath the operating system's file system, SAN is unaware of file fragmentation and uable to solve this issue. Performance suffers. This white paper details in clear terms how, where and why Diskeeper data performance technology should be used to ensure maximum SAN performance and optimum data response time. Read more.

WHITE PAPER: Oracle

Making Database Security an IT Security Priority
Tanya Baccum, SANS Institute analyst, discusses the importance of having an appropriate IT security strategy that mitigates risk to databases by introducing key steps and controls to effective database security. Read More!

Apple iCloud: How do you stay secure with this thing?
Memo to IT departments that were caught flat-footed when people started bringing their iPhones to work: You'd better get ready for the iCloud. Read More

Turkish government sites targeted by Anonymous
Hacker group Anonymous said on Thursday it has launched DDoS (distributed denial of service) attacks on some Turkish government websites, in protest against government plans to introduce Internet filtering. Read More

US looking for revolutionary binary code system
It may be one the oldest, most basic components of software code but the scientists at the Defense Advanced Research Projects Agency want to develop what they call revolutionary technologies for analyzing, identifying, and slicing binary executable components. Read More

Secure coding news flash: BSIMM3 coming in August
BSIMM3 will let organizers see how initiatives have evolved. One of its new features is the result of the group going back and re-measuring 12 of the original initiatives, to see what changes and improvements have made over time. Read More


WHITE PAPER: Extreme Networks

Identity-Aware Networking
Download this whitepaper today discover how IT can integrate identity and networking, enabling new business processes and easing regulatory compliance while improving security. Read now!

Feds seize Swiss bank account of scareware mogul
Federal authorities have seized all the cash in a Swiss bank account held by a scareware mogul and scam artist who is charged with selling phony Symantec security software. Read More

EU will take a year to set up full cybersecurity agency
Security experts have criticized the European Commission's plans to set up a team to look at how to combat cyberattacks as too little, too late, saying that more coordination between member states is needed. Read More

Data loss hits vast majority of businesses: survey
Data loss is rampant among businesses worldwide, with the most common cause of losses being lost or stolen equipment, according to a survey. Read More

UK health service warned of poor security by hacker group
The U.K. National Health Service (NHS) said Friday that no patient data was compromised after an intrusion of one of its websites by Lulz Security, a hacker group that has recently stung organizations including a U.S. public broadcasting network and Sony. Read More


WHITE PAPER: Extreme Networks

Networks in Motion
Download this whitepaper today and discover how you can cost-effectively optimize your network for the mobile demands of today's business. Examine how IT can provide: * Personalization and intelligence. * Ease of operation. * Seamless quality of user experience. * Secure on-the-go access to public and private networks. Read now!

Anonymous withdraws Indian hack under pressure
The fledgling Indian operation of hacker group Anonymous attacked the website of the Indian army on Friday, but reversed its decision after it ran into criticism from Indian supporters who were annoyed that the Indian army was targeted. Read More

Forrester's iPad Security Tips
When building a critical iPad app in-house, follow these four tips. Read More

Reports: Citigroup breached, customer credit-card info stolen
Citigroup has acknowledged that hackers broke into its network and stole credit-card information related to tens of thousands of customers in North America, according to several reports. Read More

In wake of breach, RSA names chief security officer
Eddie Schwartz, former chief security officer at Netwitness Corp., which was recently bought by EMC, has been named chief security officer of the storage vendor's RSA security division. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Microsoft Subnet: A set of classes for a Microsoft Cert from Webucator and Polycom videoconferencing system. Enter here.

SLIDESHOWS

10 SaaS companies to watch
These days, companies are applying the software-as-a-service (SaaS) model to just about everything, from core business functions, including IT, to industry-specific processes. This list, compiled with the help of SaaS trend watchers and users, provides a representative look at what types of software you'll find offered in the cloud.

MOST-READ STORIES

  1. Microsoft's automated future home, what can go wrong?
  2. World IPv6 results: The new IP protocol proves it's ready
  3. Avaya sets $1 billion public offering
  4. Warning: Urgent Microsoft update may be Firefox malware
  5. Share Netflix? Share a jail cell
  6. Google, Facebook promise new IPv6 services after successful trial
  7. Desktop virtualization: Nice solution, or new desktop standard?
  8. Feds seize Swiss bank account of scareware mogul
  9. The 7 worst tech merger ideas ever
  10. IPv6 traffic surges at launch of World IPv6 Day

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment