Search This Blog

Thursday, October 31, 2013

Microsoft cybersecurity report warns users about the evils of clinging to XP

Open-source software projects need to improve vulnerability handling practices, researchers say | Swatter gets 30 months in prison

Network World Security

Forward this to a Friend >>>


Microsoft cybersecurity report warns users about the evils of clinging to XP
After analyzing online security threats encountered across the globe from January to June 2013, on more than 1 billion systems, Microsoft's Security Intelligence Report volume 15 is broken down into "in-depth perspectives" on vulnerabilities, exploits, malware, email threats, malicious websites, cloud security and best tips for mitigating risk. Read More


WHITE PAPER: CDW

Upwardly Mobile
Read how Teamwork, a clear vision and the cloud helped CDW develop a strategy for reaping the rewards and mitigating the risks of a diverse mobile environment. Read Now

WHITE PAPER: New Relic

Secure, Reliable & Proven APM for the Enterprise
Your organization depends on your web applications to do business -- from customer facing eCommerce,banking or travel applications, to mission-critical applications for your employees or partners. When it comes to performance, visitors' expectations for service and reliability are high. Read Now

Open-source software projects need to improve vulnerability handling practices, researchers say
Many open-source software developers need to improve the way in which they handle vulnerability reports, according to researchers from security firm Rapid7, who recently found and reported vulnerabilities in seven popular open-source software applications. Read More

Swatter gets 30 months in prison
The US Justice Department said a 22-year old Massachusetts man has been sent to prison for 30 months for making hoax phone calls to police that triggered armed responses from a SWAT teams across the country. Read More

Prosecutor in Aaron Swartz case targeted by 'swatting'
It was revealed in a Massachusetts courtroom on Monday that a federal prosecutor involved in the highly controversial Aaron Swartz case was targeted by a "swatting," which is the dangerous and increasingly common practice of reporting hoax emergencies in order to mobilize police SWAT teams and terrorize victims. Read More

Start-up unveils alert system for malware
Start-up Cylance unveils its first product today, software called CylanceV that determines what is a malware threat against Windows-based machines by using an analysis technique it refers to as "machine learning algorithms." Read More


WHITE PAPER: CDW

Software Asset Management: Practices for Success
This white paper discusses best practices that can dramatically increase your success rate of a SAM deployment. Make sure and follow these steps and verify that your SAM toolkit has the necessary functionality to keep your organization steps ahead of the competition -it's a long term investment. Read Now

Many iOS apps found open to hijacking on public Wi-Fi
An Israeli startup has discovered a vulnerability in many iOS apps that attackers could secretly exploit over a public Wi-Fi network to send their own data to an Apple iPhone or iPad. Read More

Nightmares: 9 frightening realities from within the IT department
In the spirit of Halloween, CSO recently spoke to Adam Stewart, the Vice President of Engineering at Autotask, to outline the most frightening aspects of working in IT. Read More

Doomed Earth-sized planet a big mystery but a star is in its future
A newly discovered Earth-like exoplanet is likely covered in lava and really shouldn't exist - and it won't in its current form very much longer astronomers say. Read More

The coolest Air Force UFO videos
National Archives features UFO-related images, interviews Read More


WEBCAST: IBM

Webinar: IBM IIM for Fraud, Abuse and Waste in Government
View this IBM webinar to learn about the challenges and opportunities in fraud reduction, waste, and abuse in government programs and agencies. You will learn how IBM Intelligent Investigation Manager (IIM) can help your organization. Learn More.

Tech-or-treat: What 13 tech companies might be handing out this Halloween
Here's what trick-or-treaters could expect to get if these technology companies turned on their porch lights this Halloween Read More

The open-source graveyard: 7 projects that have gone belly-up
An septet of (somewhat) recently deceased open-source projects, for your ghoulish, pre-Halloween interest. Read More

Report: NSA breaks into Yahoo, Google data center links
The U.S. National Security Agency has penetrated the main communication links that connect Yahoo and Google data centers around the world, giving it access to the accounts of hundreds of millions of people including U.S. residents, The Washington Post reported Wednesday. Read More

Web app security best practices and the people who love them
When a website is attacked, the results can be devastating to an organization -- both financially and from a brand perspective. Given modern society's ever-increasing reliance on the Web, the impact of a breach and the associated costs are going up, and fast. Adding more "robust" firewalls or allocating more budget to anti-virus protection is not the answer. It's still an important step, sure, but these controls provide nearly zero protection against today's web-based attacks. Read More


SLIDESHOWS

10 most powerful network management companies

Our look at the biggest players in the network management, um, world.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 19 Apple rumors that were just wrong

2. The open-source graveyard: 7 projects that have gone belly-up

3. 5 best and 5 worst cities for IT salaries

4. Juniper unveils new fabric switch, architecture

5. 'Joe the IT guy' video exceeds not-so-lofty expectations

6. Microsoft urges Windows 8 upgrade for security sake

7. Windows 8.1 networking cheat sheet

8. The must-have iPad office apps, round 7

9. Microsoft may turn to Windows Defender for unprotected PCs

10. What's holding back the cloud industry?


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: