Search This Blog

Thursday, June 24, 2010

20 percent of Android apps can threaten privacy, says vendor

  Beyond the petaflop: DARPA wants quintillion-speed computers | iPhones, iPads in the enterprise: 5 security views
 
  Network World Security

Forward this to a Friend >>>


20 percent of Android apps can threaten privacy, says vendor
Twenty percent of applications on Android Market let third parties access private or sensitive information, according to a report from security vendor SMobile Systems. Read More


WHITE PAPER: Qualys Inc.

12-point checklist outlines key considerations
Discover a 12-point checklist for choosing the best vulnerability management solution for your organization. Read now!

RESOURCE COMPLIMENTS OF: AT&T

AT&T
Designing Tomorrow's Ethernet-Based Metropolitan Area Networks Click to continue

Beyond the petaflop: DARPA wants quintillion-speed computers
Not known for taking the demure route, researchers at DARPA this week announced a program aimed at building computers that exceed current peta-scale computers to achieve the mind-altering speed of one quintillion (1,000,00 Read More

iPhones, iPads in the enterprise: 5 security views
When it comes to mobile devices, IT security practitioners prefer employees use a BlackBerry because it's easier to control the data users share on them than, say, an Android or iPhone. But as consumer-based devices like the Apple brands get more sophisticated with each release, it's getting harder to keep them out of the workplace. Proliferation of the iPad has only heightened enterprise hunger. Read More

Met Police to investigate Google Wi-Fi data collection
The Metrolpolitan Police force has confirmed it will investigate Google following the search engine's recent admission it had mistakenly collected data from unsecured Wi-Fi networks for the past three years. Read More


WHITE PAPER: IBM Corporation

Rethinking PCI Requirements
When compliance validation activities are executed in house, company officials become fully liable for any omissions or errors. Using a third-party vendor can shift the risk away from corporate management. Learn how IBM can become your trusted partner for PCI compliance. Learn More

Dot-org domains can now be protected by DNSSEC
On Wednesday, .org became the first generic top-level domain to offer its customers improved security using DNSSEC (Domain Name System Security Extensions). Read More

Most firms face security 'red alert' as XP SP2's retirement looms
Three out of four companies will soon face more security risks because they continue to run the soon-to-be-retired Windows XP Service Pack 2 (SP2). Read More

Fast foreign language translation software to get final touches
Raytheon's BBN Technologies this week got a $17 million contract to finish a five-year project that will result in a software system that can transcribe, translate and distill large volumes of speech and text in multiple languages - all with more than 90% accuracy. Read More


DOWNLOAD: Qualys Inc.

Security & Compliance Suite Trial
QualysGuard Security & Compliance Suite Trial The 14-day Trial includes: • Unlimited network mapping and discovery • Unlimited network perimeter scans • PCI Compliance scanning • Web application security scanning • IT security policy creation, scanning and reporting Learn More!

Note to Washington: You Own the Information Security Communications Gap
I'm just back from participating in the Symantec Government Symposium held yesterday in Washington DC. The event was extremely informative with keynote presentations by Cybercoordinator Howard Schmidt, and Director of Plans and Policies for the U.S. Cyber Command, Major General Suzanne M. Vautrinot. For my part, I sat on a cyber supply chain security panel with folks from DOD, DHS, and HHS. Read... Read More

Cisco NAC strong in-line, lacks on edge
Despite a strategy in flux, Cisco had some positive feedback from product tester and reviewer Joel Snyder on its NAC offerings. Read More

Lieberman Cybersecurity Bill Could Change IT Procurement
While it may seem like cybersecurity issues have taken a back seat in Washington, there is actually a lot of work happening on Capitol Hill. Senate majority leader Harry Reid (D, NV), is pushing all Senate committees with any type of cybersecurity or industry oversight to get on their legislative horse and address the existing mess. Read More

 
 
 

Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

Computerworld and Network World: Best of Green IT

Computerworld and Network World: Best of Green IT Computerworld and Network World are teaming up to identify the top organizations leading the way with green-IT efforts and the coolest green-IT products. Computerworld will feature two ranked lists in its Oct. 25 issue: Top green-IT end-user organizations and a Top green-IT data center suppliers/vendors. Network World will feature the most effective green-IT products, as cited by survey respondents, in its Oct. 25 issue and online. Please fill out our short survey or forward this link to the person in your company best able to answer questions about IT energy issues. Surveys should be submitted by Thursday, July 1 at 12 noon EST.

SLIDESHOWS

The view from the Googleplex
We recently visited the "Googleplex," Google's expansive headquarters in Mountain View, Calif., for an interview, and took the chance to snap a few pictures of life inside what must be one of the most entertaining workplaces in America.

Network access control in a nutshell
Twelve leading NAC products were put to the test. Here's what we found.

MOST-READ STORIES

  1. Google Voice no longer an invitation-only affair
  2. Meet the father of Google Apps (who used to work at Microsoft)
  3. Apple leaves iPad vulnerable after monster iPhone patch job
  4. Cisco announces the CCIE Emeritus Program
  5. More than a quarter of iPhones break within two years
  6. 40/100G Ethernet standard ratified
  7. VeriSign SSL hackable - Comodo exposes, VeriSign denies
  8. Open-sourced textbooks could ease college costs
  9. Visiting the Googleplex
  10. Ultimate guide to network access control products

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: