Search This Blog

Thursday, November 07, 2013

Microsoft offers quick fix for Zero-Day vulnerability

Windows Vista, Lync, older Office versions under attack via new vulnerability | Users reveal their biggest concerns with the cloud

Network World Security

Forward this to a Friend >>>


Microsoft offers quick fix for Zero-Day vulnerability
Confirming reports of limited attacks in South Asia and the Middle East, Microsoft released a security advisory on Tuesday warning of a new vulnerability targeting the TIFF image format. Read More


WHITE PAPER: Dell

Tech Brief: Exchange 2013 Data Loss Prevention
Protecting your company's critical data is a critical, mandatory part of an Exchange administrator's tasks. In this white paper, learn about the data loss prevention feature in Exchange 2013 and Exchange Online, how it controls inbound and outbound data flow and how it works for businesses of any size. Read now!

WEBCAST: ForeScout Technologies

Continuous Monitoring & Mitigation: the New InfoSec Frontier
Given network, device, access and threat dynamics, how can IT be more efficient and effective to identify and resolve exposures and attacks? This live broadcast brings together a panel of industry experts to discuss the advantages of leveraging controls and intelligence through a bi-directional integration. View now >>

Windows Vista, Lync, older Office versions under attack via new vulnerability
Microsoft warned Tuesday that attackers are actively targetingA Windows Vista, as well asA Microsoft Office 2003 through 2010, with an attack that would give hackers the same rights as the victim. Read More

Users reveal their biggest concerns with the cloud
I recently wrote a story about what some folks in the cloud industry see as the biggest issues holding back adoption of cloud computing. Topics like process, security and data integration all came up. But all those people are from the vendor side of the house. READ: What's holding back the cloud industry? Read More


WHITE PAPER: AT&T

How to navigate the ever-changing mobile device landscape
Smartphones, tablets, social networks, and cloud services are all popular, incredibly useful, and a security risk. These days, the security focus is on mobile devices, as they tend to be used a lot to work with corporate information. Learn More

NASA: Eight amazing facts about Russia's exploding meteorite
NASA scientists and a team of 59 international experts today detailed some of their findings about the meteoroid that exploded over the Russian city of Chelyabinsk on Feb. 15, 2013. And what they have discovered so far is pretty amazing. Read More

Microsoft waves more security pros into the pool for $100K bounties
Microsoft on Monday expanded its $100,000 bounty program, and will accept reports of in-the-wild attacks that demonstrate new techniques of bypassing Windows' anti-exploit technologies. Read More


WHITE PAPER: New Relic

Secure, Reliable & Proven APM for the Enterprise
Your organization depends on your web applications to do business -- from customer facing eCommerce,banking or travel applications, to mission-critical applications for your employees or partners. When it comes to performance, visitors' expectations for service and reliability are high. Read Now

Long live perimeter security
It is not possible to build the perfect security perimeter. But that doesn't mean you shouldn't try. Read More

INSIDER
5 ways that BYOD is shaking up tech support
Amid the clamor of "bring your own device" (BYOD), a question lurks in the background: "What happens to technical service and support?" Concerns for the tech support function encompass the extremes, from agents being overwhelmed with calls, to their becoming inhabitants of a help desk ghost town. Read More

Sensible API testing
This blog-post is loosely based on a session on "API Testing and Debugging" that I was part of at a major API conference a couple of weeks ago. This time around, instead of telling the audience about new and old cool tools for API testing and quality out there, I wanted to take a step back and talk about testing and quality at a higher level and give insight into an important debate in the testing... Read More


SLIDESHOWS

19 Apple rumors that were just wrong

Some of the rumors about Apple over the years were just ridiculous.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. High-gain patch antennas boost Wi-Fi capacity for Georgia Tech

2. Cisco takes fight to SDNs with bold Insieme launch

3. Biggest tech industry layoffs of 2013

4. Intel's open-source Galileo computer on sale for $69.90

5. Chinese professor builds Li-Fi system with retail parts

6. 12 must-have iPad apps for newbies

7. Wi-Fi's latest speed boost: 802.11ac client radios

8. First look: The Cisco/Insieme family

9. FBI adds five lawbreakers to Cyber Most Wanted list

10. Spike in traffic with TCP source port zero has some researchers worried


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: