Monday 23 May 2011

You call that a virus? How I kicked the Mac Defender's butt in five seconds

Security researcher slams Microsoft over IE9 malware blocking stats | Secure authentication to the cloud

Network World Security

Forward this to a Friend >>>


You call that a virus? How I kicked the Mac Defender's butt in five seconds
About six months ago, I bought the MacBook Air, the first Apple computer I've owned since my childhood self played Oregon Trail on the Apple II in my family's house. I was told by some Mac lovers that I'd never need anti-virus software, but I installed the free Sophos software just in case.  Read More


WHITE PAPER: Dell

Foundations of Security Information Management
This guide examines the details of each of these processes and provides best practices to build a foundation for SIM. Learn more.

WHITE PAPER: Quest Software

Controlling and Managing Super User Access
Effectively managing privileged – aka "super user" – accounts is vital for addressing your company's security concerns. In this Quest white paper, see why native tools are limited when managing these accounts. Read now!

Security researcher slams Microsoft over IE9 malware blocking stats
Microsoft's claims that Internet Explorer 9 (IE9) blocks attacks just don't add up, a security researcher charged Friday. Read More

Secure authentication to the cloud
Directories and directory stores featured in a great workshop session I attended at the recent European Identity Conference (EIC), which was also a good place to catch up with an old friend, Michel Prompt -- CEO of Radiant Logic, one of the pioneers in virtual directories. I want to tell you about a new service from Radiant Logic. Read More

US wants unconventional, intelligent apps to help patients make healthcare decisions
The U.S. Department of Health and Human Services today said it would fund the development of a new generation of what it called novel, unconventional intelligent applications that could help people make complex health decisions. Read More


WHITE PAPER: HP

Analysis of HP D2D Product Line
The HP D2D product line was first announced in early 2007, providing both disk to disk and VTL backup. In June 2010, the product line was updated to include StoreOnce powered by Intel Xeon ®processor 5500 series, HP Labs developed inline data deduplication, along with a number of other enhancements. Read More Today!

Sony hit again with two hacks
Hackers have apparently hit Sony again, adding to the embarrassment caused by earlier massive attacks on its PlayStation Network. Read More

Industry agrees on security vulnerability reporting format
Three years after its founding, the Industry Consortium for Advancement of Security on the Internet (ICASI) is starting to bear fruit with the launch of version 1.0 of its framework designed to allow tech vendors to more easily share data on software vulnerabilities. Read More

Chinese policies put foreign firms at disadvantage, U.S. report concludes
In order to boost local Chinese companies and thwart foreign-based firms, the Chinese government has shown strong favoritism toward Chinese-owned manufacturers in the telecommunications and software markets, according to a U.S. government agency report. Read More


WHITE PAPER: Diskeeper Corporation

NEW Diskeeper 2011 EnterpriseServer FREE 30-day trialware
Bring your largest and most mission-critical server operations to a new level of efficiency and reliability. Diskeeper 2011 EnterpriseServer provides uncompromising peak performance continuously and without requiring downtime or further management. Learn more.

VMware seeks security 'manager of managers' role for vShield
With the popularity of its virtual-machine software soaring, VMware has been focusing on optimizing security for its vSphere platform both through cooperation with third-party security vendors and encouraging a shift to its own software-based security architecture known as vShield. Read More

Symantec to acquire Clearwell for e-discovery
Symantec today announced it has entered into an agreement to acquire privately held Clearwell Systems for about $390 million, a move that will put Symantec in the e-discovery market. Read More

Google moves fast to plug Android Wi-Fi data leaks
Google today confirmed that it's starting to roll out a server-side patch for a security vulnerability in most Android phones that could let hackers snatch important credentials at public Wi-Fi hotspots. Read More

Chaotic actor: Understanding Anonymous and ourselves
Josh Corman (@joshcorman) asked if he could share an important piece of writing with our readership. As one of our few IT security philosophers, Josh almost always makes you think. His current bully pulpit is at The 451 Group as the Research Director for Enterprise Security leading a pretty atypical motley crew of anti-analysts with street cred. This may be his day job, but Josh has been on a personal mission for years to challenge and improve the way we approach security. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from Cisco Subnet: 15 copies of IPv6 for Enterprise Networks. Enter here.

SLIDESHOWS

A quick guide to '4G' phones
We've created this handy guide to 4G smartphones – all of which are based on the Android operating system right now – to help you look past the marketing rhetoric and learn what to really expect from these phones.

MOST-READ STORIES

  1. When Steve Jobs isn't wearing jeans and a black turtleneck
  2. Six rising threats from cybercriminals
  3. Nonprofit treats Microsoft Outlook frustration with Google Apps
  4. Siemens SCADA hacking talk pulled over security concerns
  5. Cisco to dump Linksys, WebEx?
  6. IEEE seeks data on Ethernet bandwidth needs
  7. Microsoft: One in 14 downloads is malicious
  8. 15 best iPad apps for newbies
  9. Microsoft's cloud licensing changes: what you need to know
  10. The coming battle between Android and Windows Phone 7

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as lisab509.pcnews@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment