Search This Blog

Monday, March 29, 2010

Microsoft defends Windows 7 security after Pwn2Own hacks

IT managers could avoid grief by curtailing admin rights in Windows | Military warns of increasingly active cyberthreat from China

Network World Security

Forward this to a Friend >>>


Microsoft defends Windows 7 security after Pwn2Own hacks
Just days after a pair of researchers outwitted major Windows 7 defenses to exploit Internet Explorer and Firefox, Microsoft said the measures aren't meant to "prevent every attack forever." Read More


WEBCAST: Oracle

Identity and Access Governance – What You Need to Know
Live Webcast: Wednesday, May 5th at 1pm ET/10 am PT. Oracle presents a timely event featuring the Burton Group's, Kevin Kampman, who will provide an overview of the latest technology for identity management. Get guidance on compliance, security, identity management and other topics and participate in a live Q&A. Register Today!

WHITE PAPER: PC Mall

Server Virtualization: Breaking Performance Barriers
Server virtualization reduces cost, increases availability and enhances business agility. But for many companies, a focus only on cost reduction can become a problem. Download this HP white paper to learn how to reap virtualization's additional benefits, including built-in, cost-effective high availability & disaster recovery. Learn More

IT managers could avoid grief by curtailing admin rights in Windows
Microsoft endures a lot of criticism for its Patch Tuesdays, frequent vulnerabilities and security weaknesses, but many times, users bring those problems on themselves by not using the access management tools they have at their disposal, say two people in the access management field. Read More

Military warns of increasingly active cyberthreat from China
On the same day that Google Inc. and the GoDaddy Group Inc. complained about China to a congressional committee, U.S. Navy Admiral Robert Willard appeared before the U.S. House Armed Services Committee with an even stronger warning about cyber-threats posed by China. Read More


WHITE PAPER: Neustar

Best Practices for Monitoring Your Cloud
Join Neustar and NetworkWorld to learn how to manage your holistic ecosystem effectively and learn five creative strategies for managing the performance challenges inherent in today's world. View Now

Browser Fingerprints: A Big Privacy Threat
Forget cookies -- even the ultrasneaky, Flash-based "super cookies." A new type of tracking may identify you far more accurately than any cookie -- and you may never know it was there. Read More

Protecting Sensitive Business Data on the iPad
The Apple iPad is coming, and--thanks primarily to the iPhone revolution--it is guaranteed to break out of its consumer-oriented shackles and start showing up at work. A quote from Star Trek: The Next Generation comes to mind: "Resistance is futile." Your business data will be assimilated. Read More


WHITE PAPER: Adobe

Collaboration Study: user Trends, IT Opportunities
A recent survey of knowledge workers shows they still rely on familiar collaboration tools such as email and telephone calls, but desire new ways to be more productive. See all the results and find out how IT can embrace current work habits and easily adapt as new technologies emerge. Read More

Phone networks try new spam abuse system
Mobile phone companies are trialling a new abuse reporting system that could make it much easier for networks to spot and block spam reported by consumers across the world. Read More

Police ask internet cafes to snoop on users
Internet café owners are being asked to snoop on online activities of its customers in a bid to combat terrorism in the UK. Read More

Protect your Facebook privacy
Whether you're a committed telly addict, a tabloid aficionado or a web surfer extraordinaire, every couple of days seems to bring another security scare. Here, we show you how to protect your privacy in Facebook. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

The Future of Big Iron
Do your IT plans include mainframes? Participate in this Aberdeen survey and see how your plans stack up to those of peers in terms of on what core applications are staying on mainframes and where the industry is headed in operating and software architecture. The goal is to get an accurate picture of the opportunity for expanded utilization, the role of 3rd-party support, and overall objectives with respect to distributed, outsourced, heterogeneous and centralized computing paradigms. Aberdeen will also establish a baseline for performance and a set of best practices for improving the efficiency and utilization of mainframe computing technologies. All survey respondents will receive a free copy of the resulting research.

Today from the Subnet communities

Massive giveaway from Cisco Subnet: 50 copies of the Cisco Press CCNP Cert Kits kits are up for grabs. Deadline March 31. NEW! 15 books on Microsoft System Center Operations Manager (OpsMgr) 2007 R2 available, too.

SLIDESHOWS

21 apps Apple doesn't want on your 3.0 iPhone
The following 21 apps today run only on jailbroken iPhones. Some may even prove precursors to features released in future Apple iPhone firmware updates.

10 geeky items you're embarrassed to admit you want
Most of us love gadgets. But there is a certain eye-popping reaction when we find a gadget that speaks to our technological selves. Owning such devices would surely be the subject of teasing from those who deny their inner geek, but it would also be the cause of more than a little envy.

MOST-READ STORIES

  1. Predictions on demand for iPad are astonishing
  2. New malware overwrites software updaters
  3. IPhone, Safari, IE8, Firefox all fall on day one of Pwn20wn
  4. China's Great Firewall spreads overseas
  5. Netflix Wii streaming discs to arrive in mailboxes tomorrow
  6. Software tracks employee Facebook, Twitter activity
  7. Five technologies in the mainstream, thanks to Apple
  8. Only a few days left to snag your CCNP cert training materials
  9. 20 years for notorious TJX hacker Gonzalez
  10. Researchers sound alarm on Web app 'side channel' data leaks

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: