Wednesday, November 30, 2011

Hackers launch millions of Java exploits, says Microsoft

Facebook under privacy watch for 20 years, Zuckerberg: 'we've made a bunch of mistakes' | Another SCADA threat? Well, only if you count white-lighting as a hazard

Network World Security

Forward this to a Friend >>>


Hackers launch millions of Java exploits, says Microsoft
Hackers continue to launch attacks exploiting vulnerabilities in Oracle's Java software in record numbers, Microsoft said. Read More


WHITE PAPER: NetIQ

Security Information and Event Management eGuide
Security threats these days are increasingly focused on critical components of enterprise infrastructures – the servers, databases, and directories that store and manage crucial corporate information. Learn More!

RESOURCE COMPLIMENTS OF: Palo Alto Networks

10 Things Your Next Firewall Must Do
Choosing a next-generation firewall is more than a simple comparison of technical features. It's about balancing the needs of the business with the risks associated with modern applications. Gain access to valuable information in one location- read articles and watch videos that will empower you to make the right decision. Learn More!

Facebook under privacy watch for 20 years, Zuckerberg: 'we've made a bunch of mistakes'
Facebook settled with the FTC over "charges that it deceived consumers by telling them they could keep their information on Facebook private, and then repeatedly allowing it to be shared and made public." Jon Leibowitz, Chairman of the FTC said, "Facebook is obligated to keep the promises about privacy that it makes to its hundreds of millions of users. Facebook's innovation does not have to come at... Read More

Another SCADA threat? Well, only if you count white-lighting as a hazard
After this month's now disputed cyber-attack on an Illinois water authority site, you can't blame the utility industry for being a bit under stress. Perhaps such stress relief was what one water department employee had in mind when he allegedly set up a moonshine operation using the Groton, Mass., water supply facility. Read More

Cisco, Juniper, Check Point, Palo Alto among firms in security contest
In the security popularity contest of the moment, Cisco and Juniper are down and Palo Alto Networks and Check Point are up when it comes to network firewalls, according to one research firm. Read More


WHITE PAPER: i365

Trusted Data Assurance in the Cloud
Cloud-based services are here to stay. Cloud services are even more attractive for companies who are being hit with the high cost of meeting compliance requirements - especially for small and mid-size companies that have shrinking or no information security budget. Read now!

Network World's 2011 Gift Guide: Indiana Shaw and the Office of Doom
Black Friday and Cyber Monday are over, but there's still plenty of time left in the 2011 Holiday shopping season. Need some ideas? Here's a lighthearted look at the Keith Shaw's picks for his annual Cool Tools Holiday Guide ... with this year's Indiana Jones theme. Read More

Holiday Shopper Beware: Smartphone Thieves Are Getting Smarter
It's beginning to look a lot like a mobile Christmas, and Grinch-like phone thieves will be out and about. Here are tips on how to keep your smartphone and data safe. Read More

WikiLeaks: Security worries impede new submission system
WikiLeaks has postponed the launch of its new secure submission system due to recent security compromises that seriously affected the credibility of the SSL infrastructure. Read More


WEBCAST: ForeScout Technologies

CISO in the Know - Mitigating Modern Attacks
This webcast examines sophisticated and targeted threats, security gaps, techniques and new technologies with regards to understanding and defending against zero-day threats, propagating worms, low-and-slow attacks and advanced persistent threats (APT). Learn more.

As cyberattacks grow, take security seriously
No company wants to be the subject of the next headline about a cybersecurity attack or critical data loss. Losing business data or customer information takes a toll on your business' reputation and its pocketbook. While it is impossible to entirely avoid an attack, there are steps you can take to mitigate the effects. Read More

WatchGuard launches iOS-friendly security appliance
WatchGuard's latest security appliance, the XTM 330, allows business travelers from small enterprises to use their iPads or iPhones to communicate securely with the office, the vendor said on Tuesday. Read More

The cloud security checklist
Whether you're a small business relying on Google Docs for document sharing or an enterprise moving your global ERP system to the cloud, you should demand that some common security and compliance requirements are met by vendors providing applications and services over the Web. These requirements involve who can access your applications and data, as well as the systems hosting them; where the data is stored; and whether the data is hosted on dedicated, rather than on shared, hardware. They also ensure that you get detailed logs of who has accessed your data and applications so that you meet corporate and regulatory standards, and they verify that data is properly encrypted -- a factor that's more critical outside the corporate firewall. Read More



SLIDESHOWS

Top IT Turkeys of 2011
You know, it just doesn't feel like Thanksgiving to me unless I have mashed potatoes, pumpkin pie, and an iPad with the annual Network World Top IT Turkeys slideshow all arranged on the table for the feast. So let's sharpen our knives and get to the carving, because these turkeys are getting cold.

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. 25 free open source projects IT pros will love
  2. Free software activists to take on Google with new free search engine
  3. iPhone self-combusts over Australian skies
  4. Cisco tells HP to lose that suit
  5. Hackers target IPv6
  6. iPhone 5 rumor roll-up for the week ending Nov. 25
  7. Privacy to be punted again when 'balanced' against need for govt spying
  8. Open source tools for worship
  9. Cisco reorgs again, folds net management into new cloud group
  10. Windows 8 coming in 2012? 6 reasons why this could derail Windows 7 now

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment