Tuesday, June 04, 2013

7 things you can do to make Internet Explorer more secure

  What Google, Facebook and Twitter are doing right with website security | Wacky low- and high-tech wheels of the world
 
  Network World Security

Forward this to a Friend >>>


7 things you can do to make Internet Explorer more secure
How well Internet Explorer--or any Web browser, for that matter--protects against attacks and malware greatly depends on whether you keep it up to date and have the right security settings. Here's how to take the proper security measures with Internet Explorer 9 and 10. Read More


WHITE PAPER: Stonesoft Corporation

Stonesoft Firewall Appliances for Demanding Environments
To keep up with today's sophisticated threats and complex network traffic, a first generation firewall will not do. View now

WHITE PAPER: Cisco Systems

Getting the Most Out of Your Next-Generation Firewall
Trends such as BYOD and the adoption of social media and other grey applications as legitimate business tools have had profound effects on organizations of all sizes. Read Now

What Google, Facebook and Twitter are doing right with website security
The popular services of Google, Facebook and Twitter are improving in terms of security, says Scott Behrens, head of Neohapsis Labs, which took a security snapshot of them on May 28 through an analysis that included looking at server headers sent during responses to the websites. Read More

Wacky low- and high-tech wheels of the world
From cars made of firewood and bamboo to camouflaged vehicles, these are some cool cars Read More


WHITE PAPER: F5 Networks

Stop Frequent DDoS Attacks Before the Damage Is Done
This document examines various DDoS attack methods and the application of specific ADC technologies to block attacks in the DDoS threat spectrum while securely delivering applications and protecting the network, the session, and the user. Read Now.

10 surprising things from my 20 years with Network World
Yep, I've been writing for Network World for 20 years and a lot has happened in that time ... here are 10 of the most surprising Read More

McAfee sees surge in spam, Koobface samples, MBR attacks
The first three months of 2013 have seen a surge in spam volume, as well as large numbers of samples of the Koobface social networking worm and master boot record (MBR) infecting malware, according to antivirus vendor McAfee. Read More


WHITE PAPER: Aruba Networks

The New World of Mobility Management
Mobility management continues to evolve as BYOD and mobile application deployments become more commonplace. There isn't a "one size fits all" strategy. Read Now

Defending against exploit kits
Exploit kits comprised of malicious programs that identify and then attack cyber-vulnerabilities and spread malware represent the dark but massively profitable side of cybersecurity attacks. Read More

Google nixes Glass facial recognition due to privacy concerns
Google will not be adding facial recognition software to its futuristic-looking computerized eyeglasses at this point because privacy protections aren't strong enough yet. Read More

LinkedIn aims to keep hackers out with two-factor login
Add LinkedIn to the list of Internet companies trying to make themselves safer from cyberattacks by adding two-step authentication. Read More

 
 
 

SLIDESHOWS

The 20 best iPhone/iPad games of 2013 so far

Fish turn into money, sorcerers rule and things get creepy in these iPhone and iPad games.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. iPhone 6 rumor rollup for the week ending May 31

2. Asus intensifies Android tablet price war with $129 Memo Pad HD7

3. FBI: Cyber criminals hitting photo-sharing apps to spread malware, access information

10. Cisco not looking to kill Microsoft/Skype deal, says Chambers

8. Stack wars: OpenStack v. CloudStack v. Eucalyptus

9. Look out, Google Fiber -- scientists build 400G connection

7. Microsoft outs the new features in Windows 8.1

4. How Fortune 500 companies are managing BYOD

6. The Moto X phone is real! It's really real!

5. Cisco leading 100G Ethernet

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment