Monday, August 29, 2011

DHS warns that Irene could prompt phishing scams

  IT security rundown for week ending Aug. 26 | Software tracking could turn Chinese piracy into revenue
 
  Network World Security

Forward this to a Friend >>>


DHS warns that Irene could prompt phishing scams
As Hurricane Irene barrels toward the eastern seaboard, the U.S. Department of Homeland Security is warning government agencies and private companies to be on the lookout for storm-related phishing attacks and other malicious cyberactivity. Read More


RESOURCE COMPLIMENTS OF: Trend Micro

Trend Micro: #1 in Virtualization Security*
Trend Micro enables you to fully realize the benefits of your virtualization and cloud computing investments. Find out how our Smart Protection Network and specialized "for the cloud" Server, Data Storage, and Encryption technologies help enterprises reduce risk while maintaining compliance and controlling costs. Go to: trendmicro.com/vmworld

WHITE PAPER: Akamai Technologies, Inc.

Leveraging Cloud Security to Weather Threatening Storms
This paper assesses the current cyber threat environment and discusses the use of distributed cloud services as an effective means to protect against evolving, modern day IT threats. It takes a close look at DDoS defense in particular. Read now

IT security rundown for week ending Aug. 26
This past week in security news was highlighted by a hacking revelation out of China, bad news for banks, good news for Sony gaming customers and a curious email that might have been at the heart of the big RSA data breach. Read More

Software tracking could turn Chinese piracy into revenue
China has long been a major hotspot for software piracy. Efforts to track unlicensed software use, however, are giving companies a chance to find the offenders and turn them into customers. Or in some cases, targets for lawsuits. Read More


WHITE PAPER: Dell

IT Managers Face Security Challenges with Mobile Devices
A recent IDG survey reveals data security is the top barrier to supporting employees' mobile devices. Read more

Distracted to death (Jennifer Aniston naked)
Gibbs ponder our obsession with our digital electronics. Read More

Mobile payment security apps coming to NFC-ready smartphones
Four major credit card companies are working with the Isis mobile wallet venture to install mobile payment security applications on upcoming NFC-ready smartphones in the U.S. Read More


WEBCAST: Cymphonix

Gain Complete Control Over Internet Bound Traffic
The Cymphonix Network Composer is the only network appliance that provides comprehensive clarity into all internet bound network traffic and simply powerful tools to manage that traffic with a holistic approach. Learn More Today!

Was this the email that took down RSA?
"I forward this file to you for review. Please open and view it." Read More

China yanks video that leaked hacking tool
The state-run China Central Television network has yanked a video that inadvertently included a short clip of a cyber-attack tool targeting Falun Gong websites. Read More

Hackers could reverse-engineer Microsoft patches to create DoS attacks
A security company has demonstrated how to reverse-engineer a Microsoft patch in order to launch a denial-of-service attack on Windows DNS Server. Read More

 
 
 

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

SLIDESHOWS

The world's geekiest license plates
This slideshow goes out to all those drivers who aren't afraid to say it loud: I'm a geek and I'm proud. It's filled with images of vanity plates so geeky that they prompted someone else to take a picture and post it on Flickr. Enjoy.

MOST-READ STORIES

  1. The world's geekiest license plates
  2. Future TSA: Track All 'Daily Travels To Work, Grocery Stores & Social Events'
  3. 21 Chrome Web Apps for Serious Work
  4. Why You Shouldn't Buy a Discounted TouchPad Tablet
  5. iPhone thief accidentally IDs himself via Photobucket
  6. Before the iPhone: The kings of mobile
  7. Top 10 made-in-China iPhone apps
  8. Aging East Coast infrastructure a concern after quake
  9. Tablets becoming popular bathroom activity, survey finds
  10. Palo Alto earns short list status
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment