Search This Blog

Tuesday, October 04, 2011

The future of malware

Biometrics scares most people | BlackBerry Media Card Encryption a Security Risk?

Network World Security

Forward this to a Friend >>>


The future of malware
Personal information belonging to a full third of Massachusetts residents has been compromised in one way or another, according to the state's attorney general, citing statistics gleaned from a tough new data breach reporting law. Read More


WHITE PAPER: ExtraHop

Application Performance Management
In this eGuide, Network World, with sister publication CIO, offer news on the latest trends, best practices, and straightforward advice on these solutions and the challenges of managing application performance. Learn More!

WEBCAST: VeriSign

Webcast: 5 Best Practices for DDoS Mitigation
Examine DDoS mitigation challenges, why traditional tactics aren't enough, and go inside the 5 keys you must implement in order to minimize the impact of an attack. View now!

Biometrics scares most people
Biometrics — the security method for identifying an individual by making a match of fingerprints, iris, face, voice, DNA and other unique physical traits — scares people, an industry leader in the field acknowledged this week. But enterprise technology managers say there's no doubt biometrics is a boon to enterprise security. Read More

BlackBerry Media Card Encryption a Security Risk?
A Russian software vendor has released a product that it says can crack BlackBerry smartphone passwords, if the BlackBerry owner has enabled a media-card encryption security setting. Read More


WHITE PAPER: VeriSign

Approaches to DDoS Protection - A Cost Analysis
All organizations with an online presence or dependence on Internet-based systems need to fortify their defenses against DDoS attacks. Read this paper to learn what an attack can cost an organization, how to develop a DDoS mitigation strategy, and how to get maximum protection from your investment. Read Now!

Are you an IT security leader - really?
A surprisingly high--unreasonably high, in fact--number of organizations think their security program is part of the vanguard of risk management. Read More

NASA, Google award $1.35M prize for ultra-cool, mega-efficient electric aircraft
NASA today awarded what it called the largest prize in aviation history to a company that flew their aircraft 200 miles in less than two hours on less than one gallon of fuel or electric equivalent. Read More


WHITE PAPER: CenturyLink Business

Manage Complexity, Cost and Compliance
To outsource or not to outsource IT security—that is the question for enterprises as they face increasingly complex cyber threats. Managed security services can help organizations alleviate the cost and complexity of proactively securing the IT infrastructure. Read Now.

Facebook turns to Websense for malicious URL detection
Facebook has partnered with security vendor Websense to protect its users from third-party malicious URLs spammed on the social networking website, the companies said on Monday. Read More

On the front line against the next Stuxnet
Something has gone terribly wrong on the plant floor at ACME Specialty Chemical International Inc. Read More

Privacy Nightmare: Data Mine & Analyze all College Student's Online Activities
It is not uncommon for schools to be equipped with metal detectors, cameras for video surveillance, motion detectors, RFID badge tracking, computer programs to check school visitors against sex offender lists, and infrared systems to track body heat after school hours and potentially hunt down intruders. No parent ever wants any possibility of a school tragedy, so other biometric systems in the name... Read More



SLIDESHOWS

Geekiest cupcake designs
From mainstream iPhone and Google icons to geeky Ubuntu and Big Blue logos, cupcake bakers have taken inspiration from technology for their complex fondant-and-frosting structures. Here are some of our photogenic favorites.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center and Microsoft training of the winner's choice from Webucator.. Enter here.Also: Please take our survey on certifications and your career

MOST-READ STORIES

  1. Microsoft kills Google Chrome with bad malware signature
  2. iPhone 5 rumor rollup for the week ending Sept. 30
  3. Citigroup questions if U.S. spectrum shortage exists
  4. Cisco loses out as Brocade wins healthcare software company business
  5. Data mine & analyze all college students' online activities
  6. First look: Firefox 7 slashes memory usage
  7. Top 9 Firefox fixes
  8. Security roundup: Crazy Microsoft botnet takedown; hot biometrics
  9. IT inferno: The nine circles of IT hell
  10. Biometrics scares most people

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: