Security rundown for week ending Aug. 5, 2011 | FBI busts trio for selling stolen Apple iPhones, Macbooks from mall kiosk | ||||||||||
Network World Security | ||||||||||
Black Hat: Researcher picks apart Sophos antivirus package WHITE PAPER: Qwest Manage Complexity, Cost and Compliance To outsource or not to outsource IT securitythat is the question for enterprises as they face increasingly complex cyber threats. Managed security services can help organizations alleviate the cost and complexity of proactively securing the IT infrastructure. Read Now. In this Issue
WHITE PAPER: CA Technologies Ponemon: Security of Cloud Computing Providers This report offers the cloud providers beliefs on the state of cloud security. In addition, it compares the findings from both reports, determining similarities and discrepancies between cloud computing users and providers. Learn More Security rundown for week ending Aug. 5, 2011 FBI busts trio for selling stolen Apple iPhones, Macbooks from mall kiosk How to Conduct a Linux Server Security Audit Build a Better Virus Trap, Win $200,000 WEBCAST: Cymphonix Gain Complete Control Over Internet Bound Traffic The Cymphonix Network Composer is the only network appliance that provides comprehensive clarity into all internet bound network traffic and simply powerful tools to manage that traffic with a holistic approach. Learn More Today! Former Cisco engineer indicted on hacking charges Has your company been infiltrated by the Shady Rat hack? SAP will issue patch for NetWeaver vulnerability Scariest Black Hat story so far: Power plants at risk WHITE PAPER: Dell Security: A Multilayered Approach The resources in this Security KnowledgeVault provide expert advice on everything from creating a multilayered security strategy and deploying a more proactive fight against cybercrime, to realizing when it's time to stop going it alone and seek outside, expert help. Learn more. As targeted e-mail attacks proliferate, companies wince 'Shady RAT' hacking claims overblown, say security firms Malware turns off Windows' UAC, warns Microsoft Industrial controllers need security rewrite | ||||||||||
GOODIES FROM MICROSOFT SUBNET SLIDESHOWS Chromebooks you can buy now MOST-READ STORIES
| ||||||||||
Do You Tweet? You are currently subscribed to networkworld_security_alert as security.world@gmail.com. Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy To contact Network World, please send an e-mail to customer_service@nww.com. Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701 ** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. ** |
Everything related to Computer Security - Security Audits, Security Vulnerabilities, Intrusion Detection, Incident Handling, Forensics and Investigation, Information Security Policies, and a whole lot more.
Search This Blog
Monday, August 08, 2011
Black Hat: Researcher picks apart Sophos antivirus package
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment