Search This Blog

Monday, October 07, 2013

Microsoft to patch zero-day IE bug now under attack

Hackers steal information on 2.9 million Adobe customers | U.S. ranks fourth in Internet freedom as surveillance grows worldwide

Network World Security

Forward this to a Friend >>>


Microsoft to patch zero-day IE bug now under attack
Microsoft today said it will ship eight security updates next week to patch critical vulnerabilities in Windows and IE, with the one aimed at IE plugging the hole attackers have been exploiting for months. Read More


WHITE PAPER: Dell SecureNetworks

CISO's Guide to Advanced Attackers
No matter the size of your organization, advanced cyber-attacks represent a credible threat to your organization. Security analyst firm Securoris and Dell SecureWorks collaborated on this guide to help gather intelligence, mine for threat indicators, respond to alerts and break the attack process. Read now!

WHITE PAPER: AT&T

How to navigate the ever-changing mobile device landscape
Smartphones, tablets, social networks, and cloud services are all popular, incredibly useful, and a security risk. These days, the security focus is on mobile devices, as they tend to be used a lot to work with corporate information. Learn More

Hackers steal information on 2.9 million Adobe customers
Hackers broke into the internal computer network of Adobe Systems and stole information on 2.9 million customers, as well as source code for several of the company's products. Read More

U.S. ranks fourth in Internet freedom as surveillance grows worldwide
Internet freedom has declined in the United States over the past year as a result of its surveillance policies, reflecting a trend that appears to have caught on worldwide, according to a recently released study. Read More


WHITE PAPER: New Relic

Secure, Reliable & Proven APM for the Enterprise
Your organization depends on your web applications to do business -- from customer facing eCommerce,banking or travel applications, to mission-critical applications for your employees or partners. When it comes to performance, visitors' expectations for service and reliability are high. Read Now

10 people who should have been Apple's Siri
Who could have been a great Siri? Samuel Jackson? Clint Eastwood? Scarlett Johanssen? Read More

Web hosting firms at risk from critical vulnerability in WHMCS billing and support system
The developers of WHMCS, a popular client management, billing and support application for Web hosting providers, released emergency security updates Thursday to patch a critical vulnerability that was publicly disclosed. Read More


WHITE PAPER: VMware

The Clear Path to Cloud Security, Compliance, & Cost Control
Both customers and IT decision makers are concerned about cloud security, according to recent research. How can you negotiate this barrier to realize the benefits of cloud computing? Read this paper to learn about the techniques, tools, and technologies that will enable you to capitalize on the cloud safely and cost-effectively. Read Now

EFF chides NSA for stamping watchdog's doc Top Secret
One would imagine that lunch menus are stamped "Top Secret" at the NSA, but that didn't stop the Electronic Frontier Foundation from tweeting its indignation at seeing one of its documents getting swept up into the agency's web of secrecy. Read More

Cloud encryption: control your own keys in a separate storage vault
Much has been written about encrypting data in the cloud, but several challenges persist. Who controls or has access to the keys, and where are the keys stored? KeyNexus, a division of Dark Matter Labs, addresses those challenges with an independent key management solution that separates the lock from the keys and gives the keys solely to the data owner. Read More

US indicts 13 Anonymous members for DDoS attacks
The U.S. has brought criminal charges against 13 persons, said to be members of the hacker group Anonymous, for their alleged participation in cyberattacks as part of a campaign called Operation Payback. Read More

Start-up Netskope keeps watch on enterprise cloud usage
Start-up Netskope comes out of stealth mode today in unveiling its security service intended to help enterprises monitor how employees are using cloud-based applications, such as Salesforce.com, while also giving IT managers the ability to block data transfers or receive alerts. Read More


SLIDESHOWS

iOS 7 tips and tricks you need to learn

Some advice on getting the most out of Apple's new mobile operating system, iOS 7.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Hackers steal information on 2.9 million Adobe customers

2. The NSA quiz

3. The 'Bad Boys' of open source

4. Research buries Microsoft's Bing vs. Google claim

5. CSC: The cloud's quiet whiz kid

6. Cisco/Insieme ushering in hardware-defined networks

7. Did the Tea Party design the Obamacare website?

8. HP says open sourcing SDNs is wrong

9. Ubuntu impresses in Linux enterprise server test

10. Cisco paints its IT portrait


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: