Monday, July 15, 2013

Microsoft's latest Patch Tuesday vulnerabilities already being exploited

Report: Microsoft helped NSA circumvent its own encryption | Defcon founder's message to feds fair to some, hypocritical to others

Network World Security

Forward this to a Friend >>>


Microsoft's latest Patch Tuesday vulnerabilities already being exploited
Normally companies should proceed at their own pace when deploying Microsoft's monthly updates, known as Patch Tuesday, since they come out on the second Tuesday of every month. This month's batch, though, is pretty hefty in terms of impact and volume, so you may want to make them a priority. This month's Patch Tuesday consists of seven bulletins addressing a total of 34 vulnerabilities, and half... Read More


WHITE PAPER: Cisco Systems

Data Center Dinosaur: Adapt or Die
Nearly everything in data centers is changing, from cabling and network design, to more sophisticated, faster compact builds. Network security has to adapt, and IT must drive new security approaches--installing technologies and policies that can protect today's and tomorrow's data centers. Read more >>

WHITE PAPER: HP

Inside the Minds of Enterprise Mobile App Developers
The success of smartphones introduced a new paradigm for developing applications that's having a broad and deep impact on application development tools and software architectures. Read Now!

Report: Microsoft helped NSA circumvent its own encryption
Microsoft helped the U.S. National Security Agency circumvent the company's own encryption in order to conduct surveillance on email accounts through Outlook.com, according to a new report in the Guardian. Read More

Defcon founder's message to feds fair to some, hypocritical to others
Defcon founder Jeff Moss' request to government agencies asking them not to attend next month's annual Defcon hacker conference has evoked a mixed response from the security community. Read More


WHITE PAPER: Condusiv Technologies

Managing the I/O Explosion Without Extra Hardware
In this Technology Spotlight, IDC highlights the unexpected I/O explosion brought about by virtualization and presents new technologies that deliver exceptional application performance without additional hardware by eliminating unnecessary I/O traffic at the source. Read more. Read Now!

Yahoo says release of secret FISA court order will prove it resisted directives
Yahoo wants the Foreign Intelligence Surveillance Court to order the public release of a secret order in a 2008 surveillance dispute, as it will demonstrate that the Internet company "objected strenuously" to government directives. Read More

Microsoft: Purges, personalities, 'pursuing other opportunities'
At Microsoft periodic reshufflings of the players and the executive hierarchy are a way of life. Read More


WHITE PAPER: Netscout Systems Inc.

Good APM Practices Get Results
According to NetForecast's survey, enterprises with application performance management (APM) best practices benchmark scores above six on a ten-point scale experience 75% better results in critical areas. This research paper reveals the survey results as well as discusses the best practices for APM. Learn More.

10 excellent new features in Windows Server 2012 R2
New and improved storage, networking, remote access, BYOD, and server administration features make the R2 upgrade Read More

The weirdest, wackiest and coolest sci/tech stories of 2013 so far
From cool robots and unmanned aircraft to celebrity swatting and Moby Dick emoticons, it's been an interesting high-tech year! Read More


SLIDESHOWS

6 rising open source stars

Names you'll want to know in the free software/open-source world.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 6 highest/lowest paid IT jobs

2. Best college tech majors for landing a top starting salary

3. How to solve Windows 8 crashes in less than a minute

4. Cisco impresses with first crack at next-gen firewall

5. 8 hot mobile startups to watch

6. 10 biggest home networking mistakes (and how to fix them)

7. Meet the next open-source stars

8. The worst cloud outages of 2013 (so far)

9. The biggest security snafus of 2013

10. A look at 22 Linux Foundation newbies


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment