Search This Blog

Thursday, February 14, 2013

Microsoft unleashes a Patch Tuesday to make your head spin

  Hybrid clouds pose new security challenges | BYOD nightmare: iOS devices hobble Exchange servers when they synch
 
  Network World Security

Forward this to a Friend >>>


Microsoft unleashes a Patch Tuesday to make your head spin
It doesn't break the record for most vulnerabilities patched, or even the most security bulletins in a single Patch Tuesday, but Microsoft comes pretty close. For the February 2013 Patch Tuesday, Microsoft has a whopping 12 security bulletins, which fix a mind-numbing 57 separate flaws. Read More


RESOURCE COMPLIMENTS OF: Sophos

FREE Securing Smartphones & Tablets for Dummies Book –Sophos
Learn how to build a mobile security strategy and prevent data loss. Get your book today.

WHITE PAPER: McAfee

The New Era of Botnets
A criminal industry develops. This paper explores bot evolution, it's global prevalence, who's at risk, a look forward and combating bots using Global Threat Intelligence. Read Now

Hybrid clouds pose new security challenges
If 2013 is the year enterprises begin implementing their hybrid cloud strategies, as the experts are predicting, then it follows that this will also be the year when hybrid cloud security takes center stage. Read More

BYOD nightmare: iOS devices hobble Exchange servers when they synch
Microsoft and Apple recommend that businesses deny certain iPhones, iPads and iPods access to Calendar items until the companies can clear up a problem that slows Exchange servers to a crawl when the devices try to synch. Read More

Serious data breaches take months to spot, analysis finds
More than six out of ten organisations hit by data breaches take longer than three months to notice what has happened with a few not uncovering attacks for years, a comprehensive analysis of global incidents by security firm Trustwave has found. Read More


WHITE PAPER: F5

Vital Security Strategies for Microsoft Exchange
The demand for access to email anytime, anywhere, from any device makes it critical for IT to ensure Microsoft Exchange deployments are secure, fast, and available. Learn about vital security requirements every Exchange environment should have in place to improve security and availability for Exchange. Read Now.

Emergency Alert System devices vulnerable to hacker attacks, researchers say
Devices used by many radio and TV stations to broadcast emergency messages as part of the U.S. Emergency Alert System (EAS) contain critical vulnerabilities that expose them to remote hacker attacks, according to researchers from security consultancy firm IOActive. Read More

TechTips: Cyberstalking with LinkedIn
Didn't remember to exchange business cards? Don't worry, you can still find someone with only bits and pieces of information. Follow Nick Barber on Twitter for more TechTips @nickjb Read More

The 10 weirdest, wildest, most shocking security exploits ever
Read More


WHITE PAPER: Fiberlink Communications

Mobile Device Management Policy Best Practices
Managing smartphones and tablets is only half the MDM story. Securing the data and access points between corporate systems and your workers' iOS, Android, Windows, and BlackBerry devices requires just as much consideration and planning as protecting the devices themselves. Learn More

12 hybrid cloud security products to watch
Read More

Combating security breaches with managed file transfer technology
Last October a large company revealed that an employee mistakenly sent an email to an unauthorized recipient containing the names and Social Security numbers of former employees. Six months earlier, a larage Texas university accidentally exposed personal information about as many as 4,000 alumni in an electronic file accidentally attached to an email sent to one person who had requested a transcript. That's just the tip of the iceberg in insider-triggered security breaches. Read More

DaVinci surveillance malware distributed via zero-day Flash Player exploit, researchers say
Political activists from the Middle East were targeted in attacks that exploited a previously unknown Flash Player vulnerability to install a so-called lawful interception program designed for law enforcement use, security researchers from antivirus vendor Kaspersky Lab said Tuesday. Read More

 
 
 

SLIDESHOWS

12 hybrid cloud security products to watch

Here are 12 security products that you can buy for your hybrid cloud whether they run on premise, in the cloud or a little of both.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Android phones are connecting without carrier networks

2. Windows 8 update: Bill Gates gushes about Surface Pro

3. 10 most excellent free Android games

4. Career advice that will change your life

5. 12 enraging Office 2013 flaws -- and how to fix them

6. iPhone 6 rumor rollup for week ending Feb. 8

7. Microsoft mega-patch closes critical IE flaws, fixes 57 vulnerabilities

8. Bill Gates proves he's Bill Gates .. to Reddit's satisfaction

9. Sex sites out, IT sites in for cybercrooks planting malware

10. VMware's problems are deeper than just Microsoft

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: