Friday, 4 March 2011

20 hot IT security issues

The App Malware Problem: Is There a Solution? | Cybercriminals targeting point-of-sale devices

Network World Security

Forward this to a Friend >>>


20 hot IT security issues
From malware on Google's Android phones to the U.S. Defense Advanced Research Projects Agency trying to understand how stories or narratives impact security and human behavior, the security world certainly is never boring. Here we take a look at 20 security stories that have shaped the industry in the past few months. Read More


RESOURCE COMPLIMENTS OF: Citrix XenServer

Download Free XenServer
XenServer is the only enterprise-ready, cloud-proven virtualization platform you don't have to pay for. With live migration, centralized multi-server management, and shared storage support, you can't afford not to try it! Click to continue

WHITE PAPER: Eaton

Maximizing UPS Availability
This white paper explains why, contrary to popular belief, modular UPS designs provide superior availability even though they typically contain more parts that could potentially fail. Read More

The App Malware Problem: Is There a Solution?
Google had to remove some criminal's idea of fun from the Android Market - no surprise there. But reaction isn't sufficient - failure to address this threat puts much of the future of mobility at risk.The news that there is malware in the Android Store comes as no surprise. Any open marketplace presents an opportunity for the criminal element to ply their disgusting trade, as they have for so long on the Internet. So, the big question is what can be done about the problem. As more and more of us use our handsets and related devices as our primary information tools, a solution here is essential.... Read More

Cybercriminals targeting point-of-sale devices
Point-of-sale payment processing devices for credit and debit cards are proving to be rich targets for cybercriminals due to lax security controls, particularly among small businesses, according to a report from Trustwave. Read More


WHITE PAPER: Iron Mountain

How to Select a Provider for PC Online Backup and Recovery
Read this informative white paper to learn key considerations in selecting a provider. Read Now

Prepare for talent wars, IT poaching, Dice.com warns
IT hiring managers and recruiters are bracing for a fight over the most skilled tech pros -- and they're watching carefully to make sure their own most valued employees aren't about to flee for greener tech pastures. Read More

Nasty Fake Antivirus
Aggressive malware leaves its victims dead in the water According to multiple security researchers, fake antivirus software was the biggest cyber crimes in 2010 and continues to be a major on-line scam. When fake antivirus first appeared, it could really be categorized as "scareware" and was fairly innocuous. Fake AV popped up unexpectedly, told you that your system may be infected, and then launched a fake scanning engine. While some people were clearly... Read More


WHITE PAPER: Brocade

Introducing Brocade Virtual Cluster Switching
Brocade Virtual Cluster Switching (VCS) is an emerging technology that will revolutionize the way data center networks are architected and how they function. Read Now.

Apple to patch Safari before Pwn2Own, say researchers
Apple will patch its Safari browser before the Pwn2Own hacking contest kicks off next week, security researchers hinted today. Read More

Secure best practices no proof against Stuxnet
A Tofino Security report shows that well-secured computer systems would still get infected with Stuxnet. Read More

Real life HAL 9000: computers reacting to human emotions?
We are posed on the brink of computers recognizing and responding to users' emotions. Would you view that as cool or as a privacy invasion? Are you ready for HAL 9000 in real life?Would you trust your computer to interact on a deep personal touchy-feely level with you, reading, interpreting, reacting, or storing your emotions? Most of us at some point have had one of those days when we've tried sweet talking or cussing a malfunctioning computer, but what if the computer apologized? What if computers could sense your emotions and respond appropriately? Read More

Are smart meters real-time surveillance spies?
Smart meters provide highly detailed energy-use data that law enforcement can use to bust indoor pot farmers. And that's only the tip of potential smart meter surveillance.Smart meters provide highly detailed energy-use data. The info can be used by police to find and to bust indoor pot farms, by insurance companies to determine health care premiums, and by criminals to determine if you own high-dollar appliances and when is the best time to steal them. And that's only the tip of the potential privacy invasion iceberg. Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a Windows 7 Enterprise Technician class for three people. From Cisco Subnet: 15 copies of VMware ESXi books. Enter here.

SLIDESHOWS

20 awesome tech products at DEMO
Build-your-own iPhone and Android apps, cloud services, photo tools and more on display at DEMO Spring 2011.

Top 10 Chrome OS extensions
Though Google is pitching it as an operating system for netbooks and lightweight notebooks, Chrome OS is essentially the Chrome Web browser bolted on top of a bare minimum version of Linux. The following extensions can improve the user experience of Chrome (OS or browser) to give you some of the functionality found in a traditional operating system.

MOST-READ STORIES

  1. Google gives antiquated 404 page a makeover
  2. First look at Apple iPad 2: what's new, unchanged, still missing
  3. Jobs unveils iPad 2: sleeker, more powerful, same price
  4. Cisco caught off guard by switching hit
  5. Tablet Tumble: iPad 2 vs. Motorola Xoom
  6. iPad 2 spoiler: RIM PlayBook tablet coming April 10?
  7. Google Android's infected apps spotlight mobile danger
  8. 5 new ways to build apps for iPhone, Android and Web browsers
  9. Open source expert takes on the hardest job at Microsoft
  10. Google yanks 21 malicious apps from Android Market, phones

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as lisab509.pcnews@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment