Search This Blog

Monday, October 03, 2011

Security roundup: Crazy Microsoft botnet takedown; hot biometrics; not so hot romance scams; Facebook in trouble again

Are CIOs Too Cocky About Security? | Healthcare security needs a booster shot

Network World Security

Forward this to a Friend >>>


Security roundup: Crazy Microsoft botnet takedown; hot biometrics; not so hot romance scams; Facebook in trouble again
In one of the bigger security news stories Microsoft struck a blow against an emerging botnet called Kelihos by using a legal tactic to take down the botnet's domain names. Read More


WHITE PAPER: Intel

Raise QoS in vSphere*4 with Dell & Intel
The industry transition to 10 Gigabit Ethernet (10GbE) is creating new quality of service (QoS) challenges. This paper examines best practices for analyzing, monitoring and controlling bandwidth in VMware vSphere 4.1 environments when using Dell servers and Intel Ethernet 10 Gigabit server adapters. Click to continue

WEBCAST: Cymphonix

Gain Complete Control Over Internet Bound Traffic
The Cymphonix Network Composer is the only network appliance that provides comprehensive clarity into all internet bound network traffic and simply powerful tools to manage that traffic with a holistic approach. Learn More Today!

Are CIOs Too Cocky About Security?
The ninth annual Global Information Security Survey conducted by CSO magazine and PricewaterhouseCoopers indicates the vast majority of tech and business execs are overconfident about their security policies. Read More

Healthcare security needs a booster shot
Healthcare organizations are swiftly embracing electronic records and social media, but their investments in information security and privacy are lagging. Read More


WEBCAST: VeriSign

Webcast: 5 Best Practices for DDoS Mitigation
Examine DDoS mitigation challenges, why traditional tactics aren't enough, and go inside the 5 keys you must implement in order to minimize the impact of an attack. View now!

IBM X-Force: Mobile devices are a fast growing target of malware
Look for double the mobile exploits this year vs. 2010 and particularly watch out for mobile applications that are really malware, says IBM's X-Force security research team. Read More

Microsoft kills Google Chrome with bad malware signature
Microsoft scrambled earlier today to revise an antivirus definition file that deleted Google's Chrome browser from users' PCs. Read More


WHITE PAPER: Palo Alto Networks

Understanding and Selecting an Enterprise Firewall
This Securosis white paper analyzes the disruption happening at the enterprise perimeter, the various technical architectures capable of addressing the new requirements, and deployment considerations for optimal security, availability, and performance. Read now!

Robotic cockroach crawls out of the lab into real world
With a name like Octoroach, you'd have to be one amazing robotic bug. UC Berkley researchers this week showed of two insect-like robots that could ultimately crawl into all manner of super-secret surveillance or emergency recovery applications. Read More

2011 Ig Nobel Prizes honor offbeat research
Winners investigated yawning turtles, procrastination and the end of the world Read More

Keeping up with PCI hasn't improved much: Verizon
Businesses aren't getting much better at meeting payment card industry (PCI) standards year-to-year, perhaps because they get cocky about passing one year and figure they will breeze through the next, according to a study by Verizon PCI and Risk Intelligence teams. Read More

Mozilla puts Firefox 7 on memory diet, patches 11 bugs
Mozilla on Tuesday patched 11 vulnerabilities in the desktop edition of Firefox as it upgraded the browser to version 7. Read More



SLIDESHOWS

Geekiest cupcake designs
From mainstream iPhone and Google icons to geeky Ubuntu and Big Blue logos, cupcake bakers have taken inspiration from technology for their complex fondant-and-frosting structures. Here are some of our photogenic favorites.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center and Microsoft training of the winner's choice from Webucator.. Enter here.Also: Please take our survey on certifications and your career

MOST-READ STORIES

  1. 2011 Ig Nobel prizes honor offbeat research
  2. Facebook Timeline: Important privacy settings to adjust now
  3. Cisco loses out as Brocade wins healthcare software company business
  4. BlackBerry PlayBook going the way of HP TouchPad, says analyst
  5. NetFlash: 10 excellent IT how-to videos
  6. Chrome poised to take No.2 browser spot from Firefox
  7. Tablet throwdown: Amazon Kindle Fire vs. Apple iPad 2
  8. Teach your router new tricks with DD-WRT
  9. 16 essential Android apps for IT pros
  10. White House unveils STEM video game challenge

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: