Monday, June 11, 2012

Microsoft to repair Internet Explorer fault discovered at hacking contest

Price tag for Microsoft piece of Flame malware $1M, researcher says | 6 secrets to a successful 802.1X rollout

Network World Security

Forward this to a Friend >>>


Microsoft to repair Internet Explorer fault discovered at hacking contest
Next week's Patch Tuesday will feature a fix for a vulnerability in Internet Explorer that came to light at the celebrated Pwn2Own hacking competition held earlier this year at CanSecWest. Read More


WHITE PAPER: Teradata

Cloud Computing Models for Data Warehousing
Gain better business intelligence through private cloud self service capabilities. In this whitepaper, analyst Mark Madsen explores why private cloud computing is a better choice to meet your analytical needs as business conditions fluctuate and grow. Learn more.

WHITE PAPER: EMC Corporation

Transforming Tier 1 Applications through Virtualization
This Technology Spotlight will explore the benefits of virtualizing tier 1 applications and discuss the role that EMC Consulting plays in virtualizing top tier Microsoft applications (including Exchange, SharePoint and SQL) on the VMware platform. Learn More

Price tag for Microsoft piece of Flame malware $1M, researcher says
Back when the Microsoft Update piece of the Flame espionage-software package was still undetected it could have sold for $1 million on the malware black market, a security researcher says. Read More

INSIDER
6 secrets to a successful 802.1X rollout
Implementing and supporting 802.1X authentication on your network can be a challenge, but here are some tips that can help save you some time, money, and frustration. Read More

How to speak IT support's language
Support technicians work with some irate customers as well as customers with very complex issues. When the problem isn't a quick fix, we often end up communicating with the customer via email so they don't have to stay on the phone with us while we sort out the problem. This saves the customer time and gives us a chance to concentrate on the problem. When this happens, there are a whole new set... Read More


WHITE PAPER: Limelight

Limelight Accelerate
Your users won't wait. Reward them with fast interactions, personalized experiences, and dynamic web pages that load in real time. Limelight Accelerate combines browser-based acceleration with a robust network platform to maximize Time to Action—the time it takes for visitors to engage with the content on your site—even on mobile devices. Learn More!

California's budget crisis sparks controversial 'BYOD' plan to save money
The state of California's staggering budget problems -- now an estimated $16 billion shortfall -- have put Chris Cruz, deputy director and chief information officer at the state's Department of Health Care Services (DHCS), in a tough situation. Because of the state's ongoing fiscal crisis, he, like other agency managers, last year was told to cut use of state-issued cellphones by 50% as a cost-saving measure. Cruz decided one way to hold down costs at DHCS, which was using BlackBerries, was to have agency employees use their own smartphones instead -- without any subsidy. Read More

How Charles Dickens helped crack your LinkedIn password
Kevin Young, a computer security expert who studies passwords, is nearly at a loss for words. Literally. Read More

Mobile devices bring cloud storage -- and security risks -- to work
As the bring-your-own-device trend accelerates, companies are struggling to deal with employees who now use cloud storage services while at work. Read More


WHITE PAPER: Centage Corporation

Centage/IOMA Budgeting Survey: Benchmarks & Issues
How are other financial professionals dealing with the issues you face? This report offers you an inside peak into what the minds at over 200 financial executives are thinking and doing to impact their own bottom line. Learn more.

Oracle to issue 14 patches for Java SE
Oracle is planning to ship 14 patches related to Java SE on Tuesday, including a number with the highest level of severity under the CVSS (common vulnerability scoring system) framework, according to a pre-release announcement on the company's website. Read More

Flame's Windows Update hack required world-class cryptanalysis, researchers say
The Flame cyber-espionage malware makes use of a previously unknown cryptographic attack variant that required world-class cryptanalysis to develop, experts from the Dutch national research center for mathematics and computer science (CWI) said on Thursday. Read More

Adobe patches critical Flash bugs, ships sandboxed plug-in for Firefox
Adobe today patched seven critical vulnerabilities in Flash Player -- the fifth security update so far in 2012 -- and released a sandboxed plug-in for Mozilla's Firefox. Read More

Dept. of Homeland Security to focus on cyber workforce development
Secretary of Homeland Security Janet Napolitano today said the agency will form a cybersecurity workforce task group that will consider strategies such as expanding DHS involvement in cyber competitions and university programs, enhancing public-private security partnerships and working with other government agencies to develop a more agile cyber workforce across the federal government. The new task... Read More



SLIDESHOWS

Why the Internet needs IPv6
Explosive growth of Internet users, devices, apps creates demand for more IP addresses.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Gartner: Top 10 emerging infrastructure trends
  2. How to determine if your LinkedIn password has been compromised
  3. Googler on why he left ... for the third time
  4. What to expect in Apple's upcoming Maps app
  5. The life of a 'booth babe': high heels, long hours and leering visitors
  6. A laugh for those whose LinkedIn passwords were leaked
  7. Feds investigate who leaked classified Stuxnet cyberattack details to NYT
  8. Can Mozilla right the ship?
  9. Microsoft opens Azure to IaaS, Linux
  10. Cisco gear sold to Iran despite sanctions

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment