Tuesday, 10 May 2011

Cross-platform botnet targets both Windows and Mac users

What kind of cloud computing environment do you get for $6M? | Living legends of networking

Network World Security

Forward this to a Friend >>>


Cross-platform botnet targets both Windows and Mac users
A McAfee researcher has discovered a Java-based, cross-platform botnet that can infect both Mac and Windows macines. Read More


RESOURCE COMPLIMENTS OF: Trend Micro Inc.

Trend Micro™ in partnership with VMware®
Trend Micro™ (#1 in Server Security*) and VMware® (#1 in Virtualization**) offer innovative, complementary solutions that allow you to fully capitalize on the game-changing benefits of virtualization and cloud computing. Learn more about how Trend Micro and VMware are partnering for your protection at trendmicro.com/cloud

RESOURCE COMPLIMENTS OF: VIPRE Antivirus Business

Fast and Easy has never been so good.
When it comes to antivirus protection, you deserve FAST and EASY: FAST scan times, EASY deployment, FAST threat detection, EASY administration, FAST system performance, and EASY-to-use management console. VIPRE Antivirus Business: the protection you need, the performance you deserve. Test drive VIPRE today.

What kind of cloud computing environment do you get for $6M?
The US Air Force said today it would spend $6 million to set up a state-of-the-art cloud computing research center at the University of Illinois.  The Air Force's Assured Cloud Computing (ACC) Center, will focus on developing technology to ensure mission critical data can get through the cloud securely and sometimes in the face of a cyberattack or other interference. Read More

Living legends of networking
Read More

Cisco and NSS Labs still arguing firewall vulnerability test results
NSS Labs today is expected to say four out of five vendors -- Palo Alto Networks, Juniper, Fortinet and SonicWall -- whose firewall equipment it said was vulnerable to a hacker exploit have corrected the problem. The fifth, Cisco, maintains its ASA firewall isn't susceptible to the exploit known as the "TCP Split Handshake," which lets an attacker remotely fool the firewall into thinking an IP connection is a trusted one behind the firewall. Read More


WEBCAST: F5 Networks

BIG-IP GTM v10.1 DNSSEC In Five Easy Steps
In this Video Webinar, Peter Silva talks with F5's Sr. Field Systems Engineer, Michael Falkenrath about the new BIG-IP GTM v10.1 DNSSEC feature. They take us through the basics of DNSSEC and GTM's ability to sign DNS requests on the fly. Watch how GTM is the industry's first and the only solution to secure your DNS infrastructure. View now!

IT caught in crossfire when it comes to smartphone privacy
The news that iPhones, iPads and Android devices secretly track the locations of their owners poses a potentially serious dilemma for IT staffs. If someone's manager asks IT to retrieve that data and hand it over, what should IT do? We certainly have to acknowledge that a device that's used for business purposes but automatically tracks personal information blurs the line between personal and corporate information. Read More

Security pros launch cybersecurity index
The index will track the overall sentiment of a group of cybersecurity experts to offer a measure of cyber risk. Read More

25 ways IT will morph in the next 25 years
Imagine a world where the computers, networks and storage systems are all tens of thousands of times faster than they are today -- and then think about the sci-fi type of applications that will be possible. Read More


WEBCAST: CA Technologies

How to Maximize IT Protection and Minimize Downtime
No matter how you define a disaster, you need a strategy that provides protection, fast recovery and high availability of your systems, applications and data. Attend this webcast to learn about disaster recovery best practices and the wide range of technologies available to protect your organization. Learn More

Phishing Becomes More Sophisticated
Highly targeted phishing emails have become the preferred method for illegally breaking into corporate networks. Read More

Broadcom buying smart-card security specialist SC Square
Chip maker Broadcom said Sunday that it will pay US$41.9 million for SC Square, a move that will bring expertise in smart-card security to the Irvine, California, architect of silicon for communications equipment. Read More

WebGL hit by hard-to-fix browser security flaw
The WebGL graphics technology turned on by default in Firefox and Chrome poses a serious security risk and IT managers should consider disabling it, a security consultancy has recommended. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a 5-day Microsoft Licensing Tricks class teaching negotiation tips; a Polycom system. From Cisco Subnet: 15 copies of Cisco Unity books. Enter here.

SLIDESHOWS

Fave raves: 22 IT pros name their favorite products
We asked, and IT pros answered. Their favorite IT products keep people productive and enterprise assets safe. Check out the list.

MOST-READ STORIES

  1. iPhone 5 rumor roundup for week ending May 6
  2. So you think you know networking?
  3. Open minded: Re-inventing SuSE and three futures of Mono
  4. Cisco's 3 biggest weaknesses
  5. How to use an IPv6 hole to freeze a Windows Networks
  6. PC Porn: 8 awesome-looking components
  7. Note to John Chambers: Cut your marketing budget by 25%
  8. 25 ways IT will morph in the next 25 years
  9. Panel: The cloud requires fresh IT skills
  10. Cisco restructures, streamlines operations

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as lisab509.pcnews@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment