Wednesday, September 05, 2012

McAfee: New malware is proliferating

Did AntiSec snag Apple UDID list from FBI laptop via Java 0day exploit? | How to find out if your iPhone or iPad UDID has been compromised

Network World Security

Forward this to a Friend >>>


McAfee: New malware is proliferating
Instances of malware continue to increase steadily, with the number of new threats reaching the highest point since 2009, McAfee says. Read More


WHITE PAPER: Blue Coat Systems

Optimize and Secure Cloud, SaaS, BYOD, and Social Media
Today's threat landscape has migrated to the web causing many security professionals to prevent direct Internet access at the branch. But with new cloud-based security solutions from Blue Coat you can re-architect your network to embrace the Internet – safely – and optimize application performance. Learn more.

WHITE PAPER: McAfee

Top 4 Security Surprises That Await Private Cloud Builders
This report published by Gabriel Consulting Group discusses security risks that prospective private cloud builders might be overlooking. Learn more.

Did AntiSec snag Apple UDID list from FBI laptop via Java 0day exploit?
Is the FBI tracking 12,367,232 Apple device users? It is according to AntiSec hackers who allegedly snagged the Apple device ID list from an FBI computer and then dumped the redacted digital dirt on one million to prove it. Read More

How to find out if your iPhone or iPad UDID has been compromised
Yesterday, a hacker claiming an affiliation with AntiSec released 1 million Apple unique device identification numbers (UDIDs) from iPhones, iPads and iPod Touch devices. The Pastebin post with the data claims it was stolen from the FBI. The breach could soon affect significantly more Apple users, as the Pastebin post claims the original file the hackers stole contained 12 million Apple UDIDs. For... Read More


WHITE PAPER: McAfee

What's Holding Back the Cloud?
This report captures key findings from a blind survey of 800 IT professionals in four countries — China, Germany, the United Kingdom and the United States — that provide insight into cloud computing security concerns, and how those concerns might be alleviated. Learn more in the McAfee Securing Cloud-Based Services KnowledgeVault. Learn more.

Fiber optic "magic carpet" network could help predict falling injuries
Scientists have demonstrated a fiber optic-based "magic carpet" that can detect when someone has fallen and could be used to help predict health problems that lead to other accidents in the future. Read More

12 Tips to Prevent a Healthcare Data Breach
High-profile healthcare data breaches continue to make the news. Heed our 12-step program and keep your organization out of the headlines. Read More


WHITE PAPER: Attachmate

Secure Data Streaming with Attachmate FileXpress
The need for secure and managed file transfer when your business data in motion is a given. But what happens at the end of the line—in that uncertain space of time when the data just sits, waiting to be picked up? Learn More.

How to Securely Erase Your Hard Drive
The siren has sung and you've finally succumbed to her call: You're the proud owner of a shiny new PC; a faster, better SSD; or a bigger, better hard drive. It's time to toss your old equipment in the trash and start playing with your new toys, right? Not so fast. Read More

10 tips for implementing BYOD securely
With the Bring Your Own Device (BYOD) movement quickly becoming an accepted norm, IT needs to better understand how it impacts all aspects of the corporate network security strategy. Read More

Do sandboxes and Automated Dynamic Analysis Systems provide the protection they promise?
If you're charged with keeping malware out of your organization you're probably getting lots of visits from vendors of automated dynamic analysis systems for malware, the latest and greatest mouse trap being hawked by a slew of security companies. Read More



SLIDESHOWS

Tech CEOs' first jobs: Licorice maker, housekeeper, scuba diver and more
Before their corporate jobs, many tech CEOs got their hands dirty, scrubbing oils stains off asphalt, cleaning bathrooms, and shoveling monkey cages. Here are their stories.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Cisco eyeing Acme Packet?
  2. Dearly departed: The Windows features that didn't make it
  3. Linux Mint 13 leaves sour aftertaste
  4. How to watch football on the Internet
  5. Highest paid engineers in mobile tech
  6. 5 reasons Android users will switch to the iPhone 5
  7. Is your ISP spying on you?
  8. Windows 8 is awesome ...
  9. Rogue Microsoft Services Agreement email notifications lead to latest Java exploit
  10. Software that lies (so you don't have to)

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment