Search This Blog

Thursday, October 17, 2013

Dexter malware kills again

Oracle plugs severe security holes that put systems at hijack risk | Security firm releases tool to audit SAP's HANA

Network World Security

Forward this to a Friend >>>


Dexter malware kills again
Showtime's infamous serial killer Dexter may be gone but his equally nasty malware namesake is apparently still striking unsuspecting bank systems. Read More


RESOURCE COMPLIMENTS OF: Trend Micro

Trend Micro™ Deep Discovery for Advanced Threat Protection
Only Deep Discovery integrates custom sandboxing, adaptive blacklisting, plus C&C detection with email and web gateway, endpoint, and server security—so you can detect, analyze, adapt, and respond to targeted attacks across your enterprise. You get the best threat detection with the deepest cyber intelligence and the lowest security TCO. Protect your information from targeted attacks with the same advanced threat protection solution that Interpol relies on for global investigations. Stop the damage from targeted attacks with Trend Micro Deep Discovery.

WHITE PAPER: AT&T

How to navigate the ever-changing mobile device landscape
Smartphones, tablets, social networks, and cloud services are all popular, incredibly useful, and a security risk. These days, the security focus is on mobile devices, as they tend to be used a lot to work with corporate information. Learn More

Oracle plugs severe security holes that put systems at hijack risk
Oracle fixed on Tuesday 127 security issues in Java, its database and other products, patching some flaws that could let attackers take over systems. Read More

Security firm releases tool to audit SAP's HANA
A new tool from security vendor Onapsis aims to secure SAP's in-memory database HANA, the German company's fastest-growing data processing product. Read More


WHITE PAPER: New Relic

Secure, Reliable & Proven APM for the Enterprise
Your organization depends on your web applications to do business -- from customer facing eCommerce,banking or travel applications, to mission-critical applications for your employees or partners. When it comes to performance, visitors' expectations for service and reliability are high. Read Now

World's craziest Halloween coffins
From KISS caskets to lions and airplanes, a plethora of burial boxes populate the world Read More

Security spending continues to run a step behind the threats
Security professionals are being hammered by a powerful combination of forces: As IT systems get more difficult to defend--more open, mobile and shared--cyber-threats are also evolving to more swiftly penetrate enterprise defenses. Read More


WHITE PAPER: AT&T

Managing Mobile Access to the Cloud
Use of mobile personal cloud services is proliferating on personal and enterprise-owned mobile devices. Organizations are considering controls that appear to conflict with the spirit of BYOD and wonder if their approach is correct. Learn More

Lawmakers seek answers Obamacare Data Hub security
Two Republican lawmakers Wednesday demanded that the U.S. Department of Health and Human Services (HSS) provide information on security measures used to secure the Federal Data Services Hub that was built to support Obamacare healthcare exchanges. Read More

NSA director misled Black Hat attendees -- claims of PRISM's value overstated
Earlier this month, during a Senate Judiciary Committee hearing, Senator Patrick Leahy pressed the NSA's director, General Keith Alexander, on whether or not the figures that are used to support data collection programs, notably the bulk collection of phone records, were accurate. Read More

20 must-see products at DEMO 2013
DEMO Fall 2013 kicks off this week, giving more than 40 startups and entrepreneurs the chance to introduce their products to the world. Read More


SLIDESHOWS

8 most interesting tech gadgets of 2013

Here's a list of the eight most significant tech gadgets released to date. These aren't necessarily the best selling or most popular, but each stands out for one reason or another.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Yes, indeed, Yahoo has that Y3K problem under control

2. 8 most interesting tech gadgets of 2013

3. The unsung women of technology

4. 20 must-see products at DEMO 2013

5. Juniper seeks edge router advantage over Cisco, Alcatel-Lucent

6. Ethernet's 400-Gigabit challenge is a good problem to have

7. Alcatel-Lucent challenges Cisco, Brocade unified access

8. AT&T! Stop wasting my time!

9. Wi-Fi's latest speed boost: 802.11ac client radios

10. A lot of data could be stored here one day


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: