Search This Blog

Thursday, January 28, 2010

Apple security threats exaggerated, report reveals

Slick algorithm helps spot tech trouble in everything from networks to satellites | MoD staff leak military secrets on Facebook and Twitter

Network World Security Alert

Forward this to a Friend >>>


Apple security threats exaggerated, report reveals
Apple's desktop computers experience little malware, a review of 2009 has found, but this is partly because attacks are starting to move to the company's other platforms such as the iPhone. Read More


WHITE PAPER: WatchGuard

Avoid Compliance Violations
Protecting confidential data is serious business. Failure may result in fat fines and even jail time - not to mention damage to your brand. WatchGuard's easy-to-use, all-inclusive email and web secure content and threat prevention appliances offer a complete data protection solution. Click here.

WHITE PAPER: Tripwire

FISMA Prescriptive Guide
Learn how Tripwire helps federal agencies, as well as the organizations and contractors that store, process or transmit federal information. The FISMA Prescriptive Guide contains case studies from three fictional federal agencies, each capturing the perspective of a key stakeholder in the FISMA compliance process. Click here.

Slick algorithm helps spot tech trouble in everything from networks to satellites
Researchers say they have developed an algorithm that can be run against a variety of systems including cars, power plants, satellites and networks that would let users spot and fix problems faster. Read More

MoD staff leak military secrets on Facebook and Twitter
The Ministry of Defence has admitted that staff leaked secret information 16 times on social networking sites such as Facebook and Twitter over the past 18 months. Read More


WHITE PAPER: Trend Micro

Effectively Deal with Security Threats in Real-Time
Eliminate costly and time-consuming manual security processes with a network security overwatch layer. Raise the bar on security protection within your organization. Find out why an overwatch layer should be part of your best practice security requirements. Read now.

Security, network management vendors add log, compliance capabilities
Security vendor Tripwire develops technology to take on security event and log management, while Ipswitch's network management division WhatsUp Gold acquires Dorian Software to address customer compliance demands. Read More

Companies need more IT education to stop cyber crime
The cases of information security breaches in UK are on the rise, according to an analysis of actual data compromise cases by computer security and forensics consulting firm 7Safe and the University of Bedfordshire. Read More


WHITE PAPER: Riverbed

Rapid Replication for Virtual Servers
What's the connection between virtualization and acceleration? It's deeper than you might think. See how these two hot technologies complement each other to consolidate servers, enhance DR and simplify the IT infrastructure. Learn more.

Report: Flawed Apps Increasingly Under the DDoS Gun
A report from the CYBER SECURITY Forum Initiative (CSFI) offers further evidence that botnet herders are getting a bigger bang out of distributed denial-of-service (DDoS) attacks by targeting security holes at layer 7, more commonly known as the application layer. Read More

iPhone Hacker Cracks the PlayStation 3
Up to this point, just about every gaming console--from the Xbox 360 to the Nintendo DS--has been hacked in some way, usually to allow it to play pirated games. This excluded the PlayStation 3, which remained unhacked for over three years, leading many to believe that it is virtually impossible to hack. Read More

NASA space telescope quickly spots first asteroid
Almost as soon as it came online, NASA's Wide-field Infrared Survey Explorer has spotted a new, little over half-mile wide asteroid some 98 million miles from Earth. Read More

Internal Investigations: The Basics
Internal investigations are a vital part of a security program. It's a serious matter when an employee is alleged to be violating company rules. So-called 'insider threats' can cause as much damage as thieves outside. These threats come in many different forms, including: Read More



New look

We've revamped our newsletters so that they're cleaner, easier to read and lighter on the HTML formatting. What do you think? Let us know - and thanks for reading!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

New giveaways! Win a year's worth of 24/7 video training from ClipTraining. Win books on WS2008 R2, Cisco WAAS and the CCIE. Deadline Jan. 31. Plus: On Cisco Subnet: Are two routers enough to study for the CCNA? On Microsoft Subnet: AxCrypt: Open Source tool for encrypting files; On Google Subnet Google's reports blockbuster Q4, modest FY09.

SLIDESHOWS

Gotta start somewhere
What were the first products from today's biggest tech companies? Take the quiz.

2010's 25 geekiest 25th anniversaries
Our fourth annual compilation of the current year's most notable technology-related 25th anniversaries.

MOST-READ STORIES

  1. Facebook and Twitter? Why not just put a gun to your head?
  2. Book examines how mobsters have rampaged across the 'Net
  3. Loss of copper wiring threatens small business broadband
  4. 12 years of big-time Apple innovations
  5. Cisco announces changes to CCNP
  6. U.S. bans texting while driving trucks and buses
  7. The Apple Tablet and 10 other overhyped tech products
  8. Life after Windows: What happens to tech if Microsoft dies
  9. Apple defends AT&T, says partner will fix iPhone problems
  10. Cisco, Net App, VMware team up on virtualization security

Network World on Twitter? You bet we are

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Update your profile | Terms of Service/Privacy

Copyright Network World, Inc., 2010

Network World, Inc.,, 492 Old Connecticut Path, Framingham, MA 01701


No comments: