Thursday, October 25, 2012

Increasingly virulent adware threatens Android user privacy

  DDoS attacks against banks raise question: Is this cyberwar? | iPredators: Cyberbullying to cyber-harassing troll cop from hell
 
  Network World Security

Forward this to a Friend >>>


Increasingly virulent adware threatens Android user privacy
New generations of adware targeting Android smartphones are increasingly violating user privacy by grabbing personal information and using it without permission, a new study shows. Read More


RESOURCE COMPLIMENTS OF: Google

Google Apps for Business
Do more for less with your team using Google Apps. Custom web-based email, calendars, and documents to easily share & work together in the cloud. Start with a free 30-day trial!

WEBCAST: PhoneFactor

Strong Security for Remote Workers Is Just a Phone Call Away
Live Webcast: Tuesday, October 30th at 12:00pm ET Join Steve Dispensa, PhoneFactor Chief Technology Officer, and Sarah Fender, PhoneFactor Vice President of Marketing & Product Management, to learn how phone-based authentication is helping companies tackle complex authentication challenges. Learn More

DDoS attacks against banks raise question: Is this cyberwar?
It's been a month of crippling denial-of-service attacks on websites operated by U.S. banks and financial services firms. A terrorist organization called Al-Qassam takes credit online, but now the attacks are being blamed on Iran. Read More

iPredators: Cyberbullying to cyber-harassing troll cop from hell
Not only is October pegged as cybersecurity month, it is also national bullying prevention awareness month. When it comes to cyberbullying, there are thousands of articles online about the tragic suicide of 15-year-old Amanda Todd and how Anonymous may have unmasked the man who bullied her into sending pictures which he later posted online and sent to her friends. Read More


WHITE PAPER: HP & Intel

Top 10 Benefits of Virtualization
In this eGuide, Network World sister publications InfoWorld, and PC World examine some of the current uses of blade servers in today's data center, as well as how trends such as server virtualization are reshaping enterprise computing. Read Now!

Hackers, Security Pros Talk Penetration Testing, Social Engineering
CIO.com goes undercover (sort of) at GrrCon, the Midwest's premier conference on penetration testing and software security, to learn about cloud security, hacking, lock picking and more. Read More

INSIDER
Getting the most out of IPS
Intrusion prevention systems — security tools designed to stop problems even before they crop up — have emerged as indispensable components of defense-in-depth security strategies. Read More


WEBCAST: Fluke Networks

Solve QoS Problems in VoIP Call Centers
View this short video "Maintaining High VoIP Quality for Call/Contact Centers with Network Time Machine", to learn more about how carrier and call center customers are using Network Time Machine to rapidly determine problem domain and identify choke points in the network. View Now!

Gartner: Cisco CEO John Chambers talks HP, tech complexity and patent trolls
ORLANDO -- Cisco CEO John Chambers sat down with Gartner analysts for a wide-ranging and interesting interview at the Gartner Symposium/Itxpo today. The upbeat CEO chatted about everything from the company's greatest challenges in his 17 years at the helm to how he views the completion and many other topics. MORE GARTNER NEWS: Gartner: Top 10 strategic technology trends for 2013 Here's a look at... Read More

Russian coder puts Microsoft botnet accusation behind him
When 32-year-old Russian programmer Andrey N. Sabelnikov visited the U.S. for the first time in January, he had a surprise waiting for him. Read More

INSIDER
Securing the new data center
It's hard enough to secure resources when they are bound to a physical box, but the game changes when servers are virtualized and start to move around, not only to other servers in the data center, but also to off-premise cloud facilities. Read More

 
 
 

SLIDESHOWS

Top 10 tech gadgets of 2012
Here are 10 that made a significant impact in the industry this year.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. iPad Mini vs. Nexus 7: A head-to-head tablet comparison
  2. First look: Apple iPad mini
  3. Amazon outage started small, snowballed into 12-hour event
  4. 10 things you can get from Windows 8 that Windows 7 just doesn't have
  5. Apple unveils iPad mini and fourth-generation iPad
  6. Country's largest 4-year university expels Cisco, saves $100 million
  7. Gartner: 10 critical IT trends for the next five years
  8. .xxx to launch porn search engine
  9. Amazon EBS failure brings down Reddit, Imgur, others
  10. Juniper Networks sees another top exec leave
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

1 comment: