Wednesday 10 August 2011

Microsoft expects Internet Explorer exploits within 30 days

USB devices: The big hole in network security | Privacy Groups Protest Massive DHS Database of Secret Watchlists

Network World Security

Forward this to a Friend >>>


Microsoft expects Internet Explorer exploits within 30 days
Microsoft's monthly patches released today include a critical fix for seven holes in Internet Explorer which, if left unpatched, are considered "likely to see reliable exploits developed within the next 30 days." Read More


RESOURCE COMPLIMENTS OF: GFI Software

Who Doesn't Like Fast & Easy?
Fed up with the slow performance, missed malware detections and clunky, complex management of your organization's antivirus solution? Find out why thousands of small and medium-sized businesses have dumped their AV solutions for VIPRE Antivirus Business. It's fast, simple to manage, configurable, reliable and affordable. Test drive VIPRE today!

WHITE PAPER: Akamai Technologies, Inc.

Taming the Cloud
This whitepaper explores the components of the cloud computing ecosystem, demonstrates how Akamai is delivering services for cloud optimization, and looks forward into the evolution of this dynamic and growing market. Read now

USB devices: The big hole in network security
USB devices may be important tools foir business but they have security issues Read More

Privacy Groups Protest Massive DHS Database of Secret Watchlists
Homeland Security has a plan to expand its Watchlist Service by duplicating the FBI's existing system of watchlist records and then feed that info into a massive database in which more government people would have immediate access. According to the FBI, the consolidated Terrorist Watchlist is "one of the most effective counterterrorism tools for the U.S. Read More


WEBCAST: Cymphonix

Gain Complete Control Over Internet Bound Traffic
The Cymphonix Network Composer is the only network appliance that provides comprehensive clarity into all internet bound network traffic and simply powerful tools to manage that traffic with a holistic approach. Learn More Today!

Raid on Russian firm ChronoPay explains the demise of Mac Defender malware
Earlier this Summer, a pesky piece of Mac malware called Mac Defender reared its ugly head. WIth SEO tactics in hand, links to Mac Defender appeared high on Google search results and when users clicked through, they were whisked away to a website where javascript began downloading a .zip file. Read More

Lessons in security leadership: Jamil Farshchi
The 2011 CSO Compass Award winners discuss prioritizing investments, learning lessons the hard way, and much more Read More


WHITE PAPER: Enterasys Networks

Enabling anIncreasingly Sophisticated Customer Base
Stephens Support Services provides the IT infrastructure and support for Stephens' brokerage, holding company and hospitality businesses. Stephens Support Services is a separate organization that partners with each business, solving unique challenges and positively impacting the bottom-line through technology. Read now!

Lessons in security leadership: David Komendat
The 2011 CSO Compass Award winners discuss prioritizing investments, learning lessons the hard way, and much more Read More

Lessons in security leadership: Jennifer Bayuk
The 2011 CSO Compass Award winners discuss prioritizing investments, learning lessons the hard way, and much more Read More

Visa to make it easier for merchants to adopt chip-based card payments
Visa today announced plans that will let qualifying merchants in the U.S. eliminate the need to annually validate their compliance with the Payment Card Industry (PCI) data security standard. Read More

Tech survivors: Geek technologies that still thrive 25 to 50 years later
These 18 technologies remain core to the computing experience for IT, engineers, and developers Read More



GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

SLIDESHOWS

4 reasons Windows Phone 7 will eventually beat iPhone and Android
Here are four reasons why Microsoft will be a major smartphone player in a few years. And three reasons it won't.

MOST-READ STORIES

  1. Did Google+ ban cleavage-snuggling LEGO stormtrooper?
  2. 4 reasons Windows Phone 7 will beat iPhone and Android
  3. 16 milestones of a million, a billion or more ... from the past month
  4. How is the Cisco 76% off Nexus sale going over with customers? Not well.
  5. Defcon: The lessons of Anonymous? Corporate security sucks
  6. 'War texting' lets hackers unlock car doors via SMS
  7. Google Music vs. Amazon vs. Apple's iCloud vs. Spotify vs. Rdio vs. ...
  8. 10 cloud management companies to watch
  9. Hosed productivity suites: Google Apps or Microsoft Office 365?
  10. How Apple's iPhone transformed enterprise IT

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as lisab509.pcnews@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment