Thursday 21 April 2011

Apple iPhone location tracking has been no secret, researcher claims

Skype plugs Android app privacy hole | Phishing emerges as major corporate security threat

Network World Security

Forward this to a Friend >>>


Apple iPhone location tracking has been no secret, researcher claims
A computer forensics expert says iOS data locations logs are neither new nor nefarious despite concerns they are synched to laptops for no apparent reason. Read More


WHITE PAPER: Sophos

Malicious JavaScript Attacks: What Can You Do?
As an IT manager, you need to be able to effectively secure all of the websites you manage to avoid attack and the subsequent infection of site visitors. You also need to protect the users within your organization from becoming victims of malware. We'll review what to watch for, as well as the security strategies that will help keep you safe. Read more

WHITE PAPER: Dell

Realtime Publishers: Making SIM Work for Your Organization
This guide examines the most common challenges surrounding Security Information Management (SIM). It offers guidance on choosing and deploying a SIM implementation strategy and discusses the advantages of an in-house solution, an outsourced service, or an on-demand SIM service that combines the benefits of both. Learn more.

Skype plugs Android app privacy hole
Less than a week after confirming that a flaw in Skype for Android could leak sensitive user information, the Internet calling company has issued an urgent update to fix the problem. Read More

Phishing emerges as major corporate security threat
IT managers should make more effort to fight phishing, which is becoming increasingly effective against corporate networks. Read More


WHITE PAPER: Sophos

Why Hackers have turned to Malicious JavaScript Attacks
Reaching unsuspecting users through the web is easy and effective and hackers now use sophisticated techniques—like injecting inline JavaScript—to spread malware. Learn more about this threat, how it works and how cybercriminals make money with these types of attacks. Read now.

Are IT departments too slow to patch Windows?
Failure to install Windows Updates in a timely fashion can leave systems vulnerable to attacks despite the use of security tools. Read More

Cisco going to NSS Labs to sort out alleged firewall issues
Cisco is sitting down with NSS Labs to figure out why Cisco firewalls flunked an NSS test for a split-handshake vulnerability. Read More


WHITE PAPER: Dell

Defending the Assault on Your Data
Learn how turning to outside help, specifically designed for small and midsized businesses, can affordably provide the protection you need. It's just one of the resources, along with expert Webcasts and IDG security survey results, you'll find in this data security KnowledgeVault. Learn more.

German software maker Ashampoo warns of malware after hack
A German software company known for its Windows utilities is warning customers to be on the alert for malicious e-mail messages after its servers were hacked. Read More

Dropbox CTO responds to privacy concerns
Dropbox will decrypt and release customer files to federal authorities who show the proper warrants - which is nothing new for the online storage/synching service, its top technology executive says. Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a 5-day Microsoft Licensing Tricks class teaching negotiation tips; a Polycom system. From Cisco Subnet: 15 copies of Cisco Unity books. Enter here.

SLIDESHOWS

13 cool features of Office 365
Microsoft released the official beta version of Office 365 today, but we've been playing with it for a while now. Here are 13 cool features of the cloud-based service that combines Office, SharePoint, Lync and Exchange.

MOST-READ STORIES

  1. Asia out of IPv4 addresses
  2. Four things RIM's PlayBook got wrong
  3. Six Windows 7 nightmares (and how to fix them)
  4. Computer factories eat more energy than the devices they build
  5. Hacker 'handshake' hole found in common firewalls
  6. OpenFlow opens new doors for networks
  7. Red Hat becomes cloud service provider
  8. 10 must-have utilities for small networks
  9. Berners-Lee: Web access is a 'human right'
  10. Did you hear about the hacker who stole the open source code?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as lisab509.pcnews@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment