Friday, September 28, 2012

20 security and privacy apps for Androids and iPhones

  How to encrypt your cloud storage for free | Sophos rolls out mobile apps for anti-malware and encryption
 
  Network World Compliance

Forward this to a Friend >>>


20 security and privacy apps for Androids and iPhones
Encrypted storage, malware scanners, missing-phone-finders and more: Here are 20 apps to help protect your smartphone, your privacy and your data. Read More


RESOURCE COMPLIMENTS OF: Google

Google Apps for Business
Do more for less with your team using Google Apps. Custom web-based email, calendars, and documents to easily share & work together in the cloud. Start with a free 30-day trial!

WHITE PAPER: SafeNet Inc

Securing Sensitive Data in Virtual and Cloud Environments
This paper reveals how SafeNet ProtectV delivers critical capabilities that combine encryption, access policies, key management, content security, and authentication to help security teams effectively meet governance, compliance, and data protection mandates. Learn More

How to encrypt your cloud storage for free
If you want something done right, you need to do it yourself. That may sound like a trite cliche, but the maxim rings true when it comes to securing files that you've stored online: A handful of recent incidents--including breaches of Dropbox and iCloud--underscores the fact that even with built-in encryption and SSL transfers, cloud storage providers can't perfectly ensure the sanctity of your data. Read More

Sophos rolls out mobile apps for anti-malware and encryption
Sophos today announced a free anti-virus defense app for Google Android devices which works via the Sophos cloud-based service. Separately Sophos also made available Android and Apple iOS apps for securing files held in the cloud file-storage service Dropbox. Read More

An iPad stand, a WiFi access point, and a honeypot
I've checked out many iPad stands over the last few months and I just found what I think is one of the very best: The Uprise 360 produced by Hub Innovations. This is a dead simple design which your iPad (version 2 or 3) snaps into and you can rotate it to portrait or landscape as required. It's easy to remove the iPad when you need to and that's it ... as I said, it's dead simple and does the job. For $39.95 the Uprise 360 produced by Hub Innovations Uprise 360 gets a Gearhead rating of 5 out of 5. Read More

You might be surprised at which Web browser aced this security test
Microsoft IE9 blew away Google Chrome, Mozilla Firefox and Apple Safari in new tests by NSS Labs to measure the ability of web browsers to block malware and catch click fraud. Read More


RESOURCE COMPLIMENTS OF: Google

Google Apps for Business
Do more for less with your team using Google Apps. Custom web-based email, calendars, and documents to easily share & work together in the cloud. Start with a free 30-day trial!

Criminals hack Adobe certificate server
Criminals have broken into an Adobe server and provided two pieces of malware with a digital certificate that attest to them being legitimate code. Read More

Tufin's SecureApp Completes Triad Of Security Policy Management
It's all about the apps. That seems to be what we are hearing over and over again these days, as computing moves to an app-centric model. In security the reaization that it is the apps that matter is causing us to rethink how to manage and secure our networks. Read More

Twitter users delt malicious links via direct messages
The links install a backdoor Trojan that Sophos calls Troj/Mdrop-EML Read More

10 (FREE!) Microsoft tools to make life easier
Tools that secure, automate, pinch pennies - including some for Windows 8 Read More


WHITE PAPER: F5

Capitalize on the Cloud with a Sound Network Strategy
New research underscores cloud computing's challenging effects on corporate networks, but solutions are available. Learn More!

Banks can only hope for the best with DDoS attacks
As with Tuesday's attack on Wells Fargo, distributed denial of service attacks are said to be still crude but effective Read More

Exploring cybercriminal minds, safeguarding privacy among $50M worth of new NSF research projects
The National Science Foundation (NSF) this week awarded $50 million for more than 70 research projects focused on securing cyberspace in the United States. Read More

INSIDER
Complete guide to network virtualization
There are a number of emerging and proposed standard protocols focused on optimizing the support that data center Ethernet LANs provide for server virtualization. Several of these protocols are aimed at network virtualization via the creation of multiple virtual Ethernet networks that can share a common physical infrastructure in a manner that is somewhat analogous to multiple virtual machines sharing a common physical server. Read More

Free security products out there for the asking
Security software developers have a long history of making their work available for free. Here's a small taste, keeping in mind a few caveats, like uncertain support or limited capabilities relative to paid products. Read More

 
 
 

SLIDESHOWS

15 more useful Cisco sites
Another lineup in our continuing search for the most useful sites on the Web for Cisco users and practitioners.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. .xxx to launch porn search engine
  2. First look: Ubuntu 12.10
  3. The three best, Star Wars-influenced approaches to learning Linux
  4. Islamic hacktivists' bank hacking claims gain credibility
  5. Time to eat crow: Windows 8 is better than Windows 7
  6. Torvalds calls Romney 'a f***ing moron'
  7. iOS 6 device users report baffling range of Wi-Fi problems
  8. 11 (free!) Microsoft tools to make life easier
  9. Six free Cisco Labs
  10. 'Replacement Google' creator awaiting NFL penalty flag
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment