Wednesday, July 13, 2011

Mac security firm ships first-ever iPhone malware scanner

Microsoft patches 'sexy' Bluetooth bug in Vista, Windows 7 | A deep dive into the mysteries of Stuxnet

Network World Security

Forward this to a Friend >>>


Mac security firm ships first-ever iPhone malware scanner
French security firm Intego, which is known for its Mac OS X antivirus software, today released the first malware-scanning app for the iPhone and iPad. Read More


RESOURCE COMPLIMENTS OF: LogMeIn

Remote Support for PCs, Macs, Tablets and Smartphones
Provide instant, on-demand remote support with LogMeIn Rescue. Without pre-installed software, quickly connect to PCs, Macs and smartphones anywhere in the world. Get in, solve the problem, and be done in a flash. Plus, Rescue's SaaS-based platform means free upgrades and zero maintenance. Try Rescue free, today.

WHITE PAPER: CA Technologies

Defend Against Insider Threats
Organizations must accept the reality that insider threats are no longer an abstract concept. This paper explains the factors that are increasing the insider threat and details a proactive approach that leverages identity and access management to reduce risk and improve compliance. Learn More

Microsoft patches 'sexy' Bluetooth bug in Vista, Windows 7
Microsoft today patched 22 vulnerabilities in Windows and Office, including a bug in the Bluetooth technology within Vista and Windows 7 that could be used to hijack a nearby PC. Read More

A deep dive into the mysteries of Stuxnet
Wired has a fascinating in-depth look at what went into unraveling the mysteries of Stuxnet, sophisticated malware that based on the best available evidence was directed specifically at an Iranian nuclear plant. Headlined "How Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in History," the story is very long but well worth the read. Here's one snippet dealing with the realization... Read More


WHITE PAPER: Riverbed

Streamlined Data Protection
One of the greatest challenges today is effectively backing up and protecting the vast amounts of data stored throughout an organization. With WAN optimization, you can accelerate network-based backup by 5x and can reduce bandwidth use by up to 95%. Download this paper and learn more about this strategy today. Learn More

Will keyboards type out death knell for cursive writing?
Keyboard typing and messaging are the way of future no doubt but at the cost of cursive writing?  That seems to be the trend as Indiana this week became one of a number of states that no longer require cursive to be taught, but rather require typing skills instead. Read More

DHS: Imported Tech Tainted with Backdoor Attack Tools
When a Homeland Security official admitted to the threat of destructive coding being embedded in imported software and hardware, it caused quite a stir. Yet backdoor malware is no more a secret than the fact that nation states and rogue criminals target the U.S. Read More


WHITE PAPER: Extreme Networks

Identity-Aware Networking
Download this whitepaper today discover how IT can integrate identity and networking, enabling new business processes and easing regulatory compliance while improving security. Read now!

Anonymous hacks Booz Allen Hamilton, steals 90,000 military emails
The hacker group Anonymous claims it has stolen information from government contractor Booz Allen Hamilton that it says will help it hack into resources of other contractors and security consultants. Read More

Cyberwar and cyber-isolationism
There has been a bit of a splash in the press the last few days about a mention by former CIA Director Michael Hayden of the idea of creating new, extra secure internets for government or commerce. Read More

Consumer device use grows, but IT and security can't keep up
IT and security managers are slowly embracing the growing number of consumer devices, such as iPhones and iPads, that are being used by workers within their organizations, but many enterprises are still overwhelmed by the need to mitigate risk and support the devices. That is the finding of new research released Tuesday by Unisys Corporation. The study was conducted for Unisys by International Data Corp. Read More

iPhone and iPad Security: 4 Tips to Stay Safe
While waiting for Apple to fix the Jailbreakme.com 3.0 vulnerability, follow these four practices to avoid being bitten by malware. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Enter here.

SLIDESHOWS

10 HP TouchPad apps for newbies
HP took the wraps off its shiny new webOS-based tablet - the TouchPad - on July 1. And like the Apple iPad, the Motorola Xoom and the BlackBerry PlayBook, this tablet debuts with a pack of applications customized for the tablet form factor.

MOST-READ STORIES

  1. Cisco layoffs expected soon
  2. Buy Windows 7 today, keep same PC for Windows 8 upgrade
  3. Ballmer, Branson headline Microsoft's partner conference
  4. 7 free Windows tune-up tools and tips
  5. Anonymous breaks into Booz Allen network
  6. Who are all these hacker groups?
  7. IBM takes dim view of EU claims
  8. Google+ Privacy: 5 settings you need to know
  9. Android fans flocking to iPad for tablet fix
  10. Microsoft plans big Skype/Lync integration

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment