Tuesday 16 August 2011

Google lashes out at patent trolls with Motorola buy

Tips and tricks for protecting Android devices | Internet Explorer is best at protecting against drive-by downloads

Network World Security

Forward this to a Friend >>>


Google lashes out at patent trolls with Motorola buy
Google is apparently sick of being pushed around by patent attorneys from Microsoft and Apple. Read More


RESOURCE COMPLIMENTS OF: GFI Software

Email Security for Your Business
Safeguard against email-borne malware threats with a high performance anti-spam and antivirus email security solution. MailEssentials Complete provides comprehensive security – via a hosted service or physical or virtual appliance – based on your business infrastructure, users and budget. Download a free trial today!

WHITE PAPER: Sybase

The Enterprise Mobility Guide 2011
The Enterprise Mobility Guide 2011 features articles by industry experts, analysts and top executives on the latest mobile enterprise trends, real-world success stories, security requirements, device management, app development and more. Get a copy now, compliments of Sybase. Read More

Tips and tricks for protecting Android devices
Android doesn't rival BlackBerry when it comes to security and enterprise support. But Android devices can still be reasonably secure. Here are some tips to help you protect your investment, privacy, and data. Read More

Internet Explorer is best at protecting against drive-by downloads
Internet Explorer is better at defending against drive-by downloads than competitors' browsers and the contest isn't even close, according to a worldwide test of browsers by security research firm NSS Labs. Read More

Driver using two cell phones gets 12 month driving ban
This guy is the poster boy for why cell phone usage in cars should be banned in more places. According to press out of the United Kingdom, a man who was driving at 70MPH while texting on one phone and talking on the other has been banned from driving for a year. Initial reports said that the driver, David Secker was apparently using his knees to steer the car, an accusation he refuted in court apparently.... Read More


WHITE PAPER: GFI Software

PCI-DSS Compliance and GFI Software Products
The intent of this document is to provide you with GFI's understanding of the requirements, and how the GFI Software product line can assist you to meet PCI compliance as outlined in the PCI DSS Requirements. Read now!

Cops Use Device to Find Child Porn on Wireless Networks
It's not exactly rocket science to detect Wi-Fi networks, but a new device is helping law enforcement detect wireless networks and locate individuals who are suspected of downloading child pornography. Read More

Smartphones and corporate websites, a required match
If I remember correctly, not long after the original Apple iPhone went on sale The New York Times ran a story indicating surprise that a relatively large number of poorer people were buying the expensive phone. After some pondering, the Times concluded that the cost of the iPhone was actually small when compared to a personal computer and Internet service. The iPhone was a way that people who could not otherwise afford to be on the Internet could get reliable, reasonable speed, access for not much more per month than they were already paying for their current cellphones. Read More

US and UK zombies demand top dollar
Denizens of the malware underworld who sell access to compromised computers do so at varying rates depending on where the machines are located, researchers told the Usenix Security Symposium this week. Read More


WHITE PAPER: CenturyLink Business

Manage Complexity, Cost and Compliance
To outsource or not to outsource IT security—that is the question for enterprises as they face increasingly complex cyber threats. Managed security services can help organizations alleviate the cost and complexity of proactively securing the IT infrastructure. Read Now.

The changing face of identity and location security
For two decades, the dominant security model has been location-centric. We instinctively trust insiders and distrust outsiders, so we build security to reflect that: a hard perimeter surrounding a soft inside. The model works best when there's only one connection to the outside, offering a natural choke point for firewall defense. Read More

Adobe admits Google fuzzing report led to 80 'code changes' in Flash Player
Adobe acknowledged that as many as 80 bugs in Flash Player were reported by a Google security engineer as it defended its decision not to spell out details of the vulnerabilities. Read More

US agency releases cyber-education plan
A U.S. agency's new cybersecurity education plan calls for stronger math and science programs in schools. Read More



GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

SLIDESHOWS

4 reasons Windows Phone 7 will eventually beat iPhone and Android
Here are four reasons why Microsoft will be a major smartphone player in a few years. And three reasons it won't.

MOST-READ STORIES

  1. WiMAX is dead
  2. Google buys Motorola Mobility for $12.5 billion
  3. Steve Jobs chatting with Bill Gates in 1991
  4. 10 scariest hacks from Black Hat and Defcon
  5. Larry Page blogs on why he's buying Motorola Mobility
  6. iPhone 5 rumor roll-up for the week ending Aug. 12
  7. Samsung not bushwacked by EU tablet ban, says expert
  8. U.S. and U.K. zombies demand top dollar
  9. IBM says PC going way of vacuum tube and typewriter
  10. Purdue's hefty switch discounts 'unusual,' Cisco says

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as lisab509.pcnews@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment