Search This Blog

Thursday, October 18, 2012

Busted! Forensic expert who recovered lurid SMS warns: Phone texts don’t die, they hide

  Kaspersky is developing a secure OS for industrial control | Facebook expands blacklist of malicious URLs
 
  Network World Security

Forward this to a Friend >>>


Busted! Forensic expert who recovered lurid SMS warns: Phone texts don't die, they hide
We've all deleted texts, but for those of you who might really not want anyone else to ever see them, then you might be interested in knowing that forensics experts say, "Phone texts don't die; they hide." And that "factory reset feature" won't delete SMS well enough to stop them from being recovered either. Read More


RESOURCE COMPLIMENTS OF: Sophos

2012 Gartner Magic Quadrant for Mobile Data Protection
Information you need to choose the right encryption product – compliments of Sophos. Click to continue

WEBCAST: Dell SonicWall

Why First Generation Firewalls Aren't Making the Grade
In this exclusive webinar, learn from Dell-SonicWALL's Patrick Sweeney, how today's Next-Generation Firewalls allow businesses to scale their network security to meet the demands of emerging threats and new technology trends, while ensuring performance to meet key business objectives. Resister Now!

Kaspersky is developing a secure OS for industrial control
Russian security firm Kaspersky Lab is developing a secure operating system for industrial control systems, its chairman and CEO Eugene Kaspersky said on Tuesday. Read More

Facebook expands blacklist of malicious URLs
Facebook has added seven more antivirus vendors to its AV Marketplace, a move that gives the social network a total of a dozen companies whose databases it can tap to identify malicious website links on the site. Read More


WEBCAST: VCE & Xerox

Building a Cloud Foundation on IaaS
In this exclusive webcast from VCE, you'll learn how IaaS accelerates your business in adaptable approaches, across geographies; and provides granular visibility and access control. Best of all, IaaS assures adoption, productivity and the innovative benefits of truly flexible infrastructure. Learn more.

Deanonymizing You: I know who you are after 1 click online or a mobile call
If you like your privacy when you are using your cellphone or surfing cyberspace, then you might find it disturbing how easily you can be personally identified while doing either. Here's a look at two different deanonymizing processes by which your privacy can be obliterated. Read More

NASA exploring $1.5 million unmanned aircraft competition
NASA today said it wants to gage industry interest in the agency holding one of its patented Centennial Challenges to build the next cool unmanned aircraft. Read More


WHITE PAPER: Cisco Systems

Cisco Wide Area Application Services Software Release 5.0
Cisco® Wide Area Application Services (WAAS) provides the industry's most scalable, highest performance WAN optimization solution. Cisco WAAS is able to improve end user experience and reduce bandwidth for key applications. Learn more.

Pacemaker hack can deliver deadly 830-volt jolt
Pacemakers from several manufacturers can be commanded to deliver a deadly, 830-volt shock from someone on a laptop up to 50 feet away, the result of poor software programming by medical device companies. Read More

Over 20Gbps DDoS attacks have become common occurrences, Prolexic says
Distributed denial-of-service (DDoS) attacks with an average bandwidth of over 20Gbps have become commonplace this year, according to researchers from from DDoS mitigation vendor Prolexic. Read More

The Huawei Controversy – The Rest of the Argument
I recently published a longer-than-usual column at informationweek.com on the recent government report urging the masses not to buy anything from Huawei (as well as ZTE) on the grounds that such equipment might be fronting intelligence (or worse) efforts underway within the government and/or military of China. Read More

With breaches inevitable, 'behavioral whitelisting' bolsters fight
In the world of cyberthreat defense, security experts and vendors have basically conceded that it is a matter of "when," not "if," an enterprise will be breached. Read More

 
 
 

SLIDESHOWS

25 essential business apps for iPhone 5
The iPhone 5 is here, so it's time to start loading it up with apps.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. VMware, the bell tolls for thee, and Microsoft is ringing it
  2. Top Linux-o-lanterns from around the Web
  3. Cisco, Citrix forge ADC alliance
  4. Tablet showdown: Microsoft Surface RT vs. Apple iPad
  5. Microsoft's Surface tablet already can't compete
  6. .xxx to launch porn search engine
  7. Huawei fires back at Cisco
  8. Cisco releases OpenStack distribution
  9. 6 Apple iPad mini concepts (&1 peek at the real deal?)
  10. Why risk management fails in IT
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: