Search This Blog

Tuesday, July 31, 2012

Security soiree: Microsoft's BlueHat Prize contest

Twitter's attempt to protect TV exec's privacy backfires | Hands on with Google Handwrite

Network World Security

Forward this to a Friend >>>


Security soiree: Microsoft's BlueHat Prize contest
Microsoft's Trustworthy Computing Group recognizes securityresearchers for work on ROP Read More


WHITE PAPER: EVault (formerly i365)

The Dollars and Sense of Online Backup
Read this paper to see how using online backup can answer these challenges by leveraging cloud-based technology to securely protect your company against data loss. Read Now!

WHITE PAPER: McAfee

Top 4 Security Surprises That Await Private Cloud Builders
This report published by Gabriel Consulting Group discusses security risks that prospective private cloud builders might be overlooking. Learn more.

Twitter's attempt to protect TV exec's privacy backfires
Twitter's ill-advised attempt to enforce an apparently not applicable privacy policy, combined with the ever-formidable law of unintended consequences, has rendered the reported workplace email address of an NBC Sports executive about as private as 1600 Pennsylvania Avenue. Of course, that's only if you believe a workplace email address is private/personal in the first place ... a dubious proposition... Read More

Hands on with Google Handwrite
Macworld associate editor Serenity Caldwell takes Google Handwrite for a spin. The search company's new project lets you scribble words and letters directly on the search screen, rather than use a virtual keyboard. Read More


WEBCAST: SAP

Make Every Rep a Sales Hero with SAP Sales OnDemand: Webcast
This Webcast introduces the business challenges facing sales today, and provides an overview and demonstration of how SAP Sales OnDemand can be used to address those challenges. Learn More

The weirdest, wackiest and coolest sci/tech stories of 2012 (so far!)
From Apple to NASA and Stuxnet to robots, it's been a busy year Read More

Cuckoo Sandbox Keeps Open Source Malware Analysis Moving
I am back from my annual pilgrimage to Vegas for Security Week. Between Black Hat, DefCon and BSides Las Vegas, a critical mass of the infosec universe is on hand and it always a great learning experience in addition to a great time. I wanted to highlight a few things you probably haven't read about yet that I learned in Vegas. Read More


WEBCAST: Webroot

SecureAnywhere Business Endpoint Protection
Traditional solutions have been failing us since the 90s. See how Webroot is changing endpoint data protection with a new way of looking at security that is 30x faster than leading solutions at a fraction of the footprint. Download a free-trial in just six seconds. Learn More!

Advance Malware Protection: Network or Host?
Large organizations have legitimate cause for concern. Malware creation and proliferation is increasing rapidly as cybercriminals and state-sponsored organizations create the next round of APTs, botnets, Trojans, and rootkits. What's more, we've entered the era of micro attacks designed to compromise a targeted organization, business unit, or individual. Read More

Netflix uncages Chaos Monkey disaster testing system
Netflix has released Chaos Monkey, which it uses internally to test the resiliency of its Amazon Web Services cloud computing architecture, making available for free one of the tools the video streaming company uses to keep its massive cloud computing architecture running. Read More

Possible Anonymous network attack could target Olympics partners BT, GlaxoSmithKline
Security firm Radware claims to have spotted evidence online that suggests hactivist group Anonymous is gearing up to target denial-of-service attacks on the websites of British companies BT and GlaxoSmithKline during the Olympics, and maybe do much more. Read More

Twitter suffers malware spam outbreak
A widespread spam attack linking to malware has broken out on Twitter, according to the security firm Sophos. Read More



SLIDESHOWS

18 Notable Apple Alumni
While some with Apple ties are already well-known, others may be surprising to find on the list.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. 12 new network features in Windows 8
  2. How to watch the Olympics on the Internet
  3. Europe's supply of IPv4 addresses nearing depletion
  4. Researcher creates proof-of-concept malware that infects BIOS, network cards
  5. iPhone 5 rumor rollup for the week ending July 27
  6. The 5 hottest IT jobs right now
  7. The day VMware ate Cisco
  8. Windows 8 is a 'catastrophe,' says Valve founder and former Microsoft employee Gabe Newell
  9. Quirkiest moments at 2012 Black Hat security conference
  10. Microsoft announces new hardware for Windows 8

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: