Search This Blog

Friday, January 22, 2010

Microsoft issues emergency critical IE patch; fixes 8 holes

Apple tablet will have nothing on iX104C4M in war on terror | Military wants protection from laser weapons

Network World Security Alert

Forward this to a Friend >>>


Microsoft issues emergency critical IE patch; fixes 8 holes
As expected, Microsoft today released MS10-002 to address multiple vulnerabilities in Internet Explorer -- eight all told. This includes the Remote Code Execution vulnerability responsible for the so-called Google attacks (as reported in Microsoft's Security Advisory 979352). Read More


WHITE PAPER: WatchGuard

When Pressing the Send Button Results In Compliance Violations
Protecting confidential data is serious business. Failure may result in fat fines and even jail time - not to mention damage to your brand. WatchGuard's easy-to-use, all-inclusive email and web secure content and threat prevention appliances offer a complete data protection solution. Click here.

WHITE PAPER: Radware

Rethinking Application Security
Hacker motivation has changed from gaining fame to financial gain. Cyber crime activities now employ a new level of network attacks, which go undetected by standard network-security tools. This paper discusses the changing threat landscape and how you can protect your business from emerging threats. Read More

Apple tablet will have nothing on iX104C4M in war on terror
When it debuts next week, the Apple tablet may support thousands of iPhone applications and a dramatic color display, but it will seem like a 90-pound weakling next to the latest tablet made for the U.S. military by Xplore Technologies. Read More

Military wants protection from laser weapons
The US military, one of the world's largest developers of laser-based weapons is looking to develop technology that protects its own systems from the same weapons.  Read More


WHITE PAPER: St. Bernard

6 Steps to Evaluating Web Filtering
Web filtering that doesn't compromise network performance is just one of the critical steps when considering this technology. This paper guides you through the pros and cons of a software-based solution vs. an appliance-based filter and advises on considerations ranging from implications of your acceptable use policy to properly authenticating individuals. Read More

FBI warns lawyers: Beware of ex-wives bearing checks
You might think lawyers would be too smart to fall for these shopworn e-mail shenanigans. Not so, according to the FBI, which this morning issued a warning to barristers everywhere to be on the alert for a new wrinkle. Read More

Mobile router hacked to reveal user's location
A user of Novatel Wireless's MiFi 'portable Wi-Fi' hotspot appears to have stumbled on a security flaw that could allow an outsider to work out a user's location without their knowledge. Read More


WEBCAST: HP

Shifting Role of Network Managers
Webcast - More and more network managers are tasked with ensuring optimal application performance 24/7. No one wants to be in a position where end users are the first to notice application degradation. This webcast addresses the shifting role of network managers and provides best practices on fault and performance management. View today!

AxCrypt: Open Source tool for encrypting files
The ability to encrypt the entire hard drive for your CEO, CFO,etc. etc...is a great technology. But, while the ability to encrypt an entire disk has its advantages, there are times when you only need to encrypt certain files. For instance bit-locker or other such tools would not be neccesary for most users. As an IT Director I never had any real reason to encrypt my entire hard drive. But there definately... Read More

Clinton: US gov't will push harder against Web censorship
The U.S. Department of State will launch several new initiatives focused on fighting Internet censorship, including working with businesses and other groups to develop mobile applications that help residents of countries with repressive governments report problems, U.S. Secretary of State Hillary Clinton said Thursday. Read More

Enterprises look to service providers for help managing security logs
Managed SIM services started to gain momentum over the past two years, largely due to compliance mandates such as the Payment Card Industry data security requirements. Read More



New look

We've revamped our newsletters so that they're cleaner, easier to read and lighter on the HTML formatting. What do you think? Let us know - and thanks for reading!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

New giveaways! Win a year's worth of 24/7 video training from ClipTraining. Win books on WS2008 R2, Cisco WAAS and the CCIE. Deadline Jan. 31. Plus: On Cisco Subnet: Are two routers enough to study for the CCNA? On Microsoft Subnet: AxCrypt: Open Source tool for encrypting files; On Google Subnet Google's reports blockbuster Q4, modest FY09.

SLIDESHOWS

Gotta start somewhere
What were the first products from today's biggest tech companies? Take the quiz.

2010's 25 geekiest 25th anniversaries
Our fourth annual compilation of the current year's most notable technology-related 25th anniversaries.

MOST-READ STORIES

  1. Reports: iPhone 4G rumors heat up
  2. Verizon Wireless slashes rates for unlimited voice
  3. 40/100G Ethernet transceiver market to reach half billion
  4. IE8 limits SSL VPN options for Cisco ASA users
  5. Microsoft's Ballmer: We're staying in China
  6. Facebook unleashes lawyers on Web 2.0 Suicide Machine
  7. New BlackBerrys on the horizon
  8. Google's stance on China shatters security inhibitions
  9. Csico ASA takes on botnets
  10. EFF to public: Urge the FCC to close net neutrality 'loophole'

Network World on Twitter? You bet we are

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Update your profile | Terms of Service/Privacy

Copyright Network World, Inc., 2010

Network World, Inc.,, 492 Old Connecticut Path, Framingham, MA 01701


No comments: