Monday, 14 March 2011

Microsoft: No Pwn2Own bug in IE9

FTC to take a closer look at debt collectors' use of high-tech tools | Cisco defrauder sentenced

Network World Security

Forward this to a Friend >>>


Microsoft: No Pwn2Own bug in IE9
Microsoft on Thursday said its Internet Explorer 9 does not contain the bug exploited this week by an Irish researcher at the Pwn2Own hacking contest. Read More


WHITE PAPER: Ultrium LTO

Securing Sensitive Information
Encryption of tape data can safeguard information. Implementing LTO-4 tape drive encryption is a relatively simple process and ensures that sensitive data is anatomically secured with no tape performance penalty. Read the latest advances in encryption technology and the questions to ask regarding key management. Read now

WHITE PAPER: AccelOps

Putting the Top 10 SIEM Best Practices to Work
This e-book, provides guidance to operationalize security and put the top 10 best SIEM practices to work. Rather than an exhaustive examination of SIEM, it offers insightful details with regards to how IT organizations and information security professionals can gain more assured value from SIEM. Read now!

FTC to take a closer look at debt collectors' use of high-tech tools
FTC holding public hearing on debt collectors' use of online tools, mobile communicationsWith the advent of a host of new or advanced technologies ranging from mobile communications to online data management,  available to debt collection companies, the Federal Trade Commission is out to make sure those companies aren't abusing their place in the business world. Read More

Cisco defrauder sentenced
Minnesota man receives a year for bilking company out of $388KA Minnesota man received a year in prison for scheming Cisco out of $388,000. Philip Webb of Brooklyn Park, MN., pled guilty late last year to defrauding Cisco in a spare parts scam. Read More

Security conference dives into SAP coding problems
The Black Hat Europe conference in Barcelona next week will feature a keynote on cyberwar from Bruce Schneier, and presentations on security flaws in Apple's Mac OS X and SAP's business software. Read More


DOWNLOAD: Qualys Inc.

QualysGuard Security & Compliance Suite Trial
The 14-day Trial includes: • Unlimited network mapping and discovery • Unlimited network perimeter scans • PCI Compliance scanning • Web application security scanning • IT security policy creation, scanning and reporting Sign up for your free trial today! Learn more!

Whitelisting on its own not a substitute for antivirus software
Whitelisting technology that prevents unauthorized software from running on corporate servers and PCs is a way to prevent malware attacks but managing the package keeps the Burton Group, a division of Gartner, from recommending it as a substitute for traditional antivirus software. Read More

Industry association aims to bolster SCADA security
The International Society of Automation (ISA) calls for industrial system standard security analysis in wake of Stuxnet. Read More

Symantec's Salem: Cloud was game-changer for us
Symantec Corp. CEO Enrique Salem outlines why 03 is such a critical initiative for the company, and how cloud and virtualization changed the security threat landscape and the business opportunities for Symantec. Read More


WHITE PAPER: St. Bernard Software

Compare Web Filters, Enter to win an iPad
View this demo of iPrism Web Filter and learn why throughput speeds of up to 100+ Mbps, anti-virus protection, and seamless Active Directory/Terminal Services integration and reporting included at no charge has made iPrism the appliance-based choice for organizations of all sizes. Learn More

With hacking, music can take control of your car
About 300 years ago, the English playwright William Congreve wrote, "music has charms to soothe a savage breast, to soften rocks, or bend a knotted oak." This week we learned that it can also help hackers break into your car. Read More

Symantec finds fake Google Android update
Google's latest update for its Android mobile OS appears to already have been subverted by hackers, according to the security vendor Symantec. Read More

Senators question how WikiLeaks breach happened
Senators question how WikiLeaks obtained thousands of classified U.S. documents Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a Windows 7 Enterprise Technician class for three people. From Cisco Subnet: 15 copies of VMware ESXi books. Enter here.

SLIDESHOWS

Perks drive up pay for tech CEOs
Many tech vendors have shied away from extravagant perks, but there are still plenty worth highlighting. Like a $1.5 million tab for home security. Or how about the $36,619 one company paid to reimburse its CEO for the taxes he had to pay on the $106,589 he gained by using company aircraft for personal flights? Read on to find out which tech CEOs enjoyed the priciest perks in 2010 and which ones went to work perk-free.

First look at Google Chrome 10
Google has released the stable version of Chrome 10 and users are now being automatically updated. As always, Chrome's new features focus on security, speed and simplicity, with greater JavaScript performance, sandboxing technology for Adobe Flash, password encryption and an easier-to-use settings interface. Here's a look at the new features.

MOST-READ STORIES

  1. Researchers develop more powerful biofuel alternative
  2. Google still scrambling to recover from DroidDream Android attack
  3. Ex-Microsoft CTO publishes groundbreaking cookbook
  4. If you had bought 100 shares of Microsoft 25 years ago ...
  5. Harvard computer scientist Leslie Valiant wins Turing Award
  6. The eight most important commands on Cisco ASA security appliance
  7. VMware unleashes virtual desktops for Apple iPad
  8. Microsoft pushes more Kinect-like user interfaces
  9. Botnets, cloud computing power may be fueling attacks against VoIP
  10. Most Android, iPhone apps violate open source rules

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as lisab509.pcnews@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment