Search This Blog

Wednesday, May 26, 2010

Businesses lag in moving away from IE6 and its vulnerabilities, study says

The 10 Best Hacks of 2010 (So Far) | The smart paranoid's guide to using Google

Network World Security

Forward this to a Friend >>>


Businesses lag in moving away from IE6 and its vulnerabilities, study says
Microsoft's Internet Explorer continues to dominate corporate browser use more so than it does private use, with its nearest rival, Mozilla's Firefox, lagging far behind with one in seven businesses opting for it, according to data collected by Internet-based security service Zscaler. Read More


RESOURCE COMPLIMENTS OF: Qualys

12-Point VM Short List
Systematically finding and eliminating network vulnerabilities is key to keeping your environment secure. Download this 12-point vulnerability management checklist to better understand the most important VM criteria. Read More!

WHITE PAPER: Fluke Networks

Troubleshooting Application Problems
This comprehensive 94 page guide is a how-to resource handbook for network engineers. Learn the fundamentals of how applications work, how they flow, where applications fail and best practices and methodologies for troubleshooting network and application problems. Click here!

The 10 Best Hacks of 2010 (So Far)
In honor of Geek Pride Day, Towel Day, and the Glorious 25th of May, here are ten of our most favorite hacks featured in Geek Tech in the last five months, running the gambit from phone, car, and CPU mods. Read on for some great moments in geek! Read More

The smart paranoid's guide to using Google
Google is nearly everyone's best friend. But have you ever stopped to think about just how much Google knows about you? Read More

Is Facebook truly sorry for its privacy sins?
Want an expert lesson in how to respond without actually responding and how to apologize without saying you're sorry? Then you need to read Facebook CEO Mark Zukerberg's quasi-mea culpa in today's Washington Post. Do it now; I'll wait. Read More


E-GUIDE: Compuware

5 Tips for Getting the Best Web App Performance
This eBook, compiled by Network World, explores the pressing issues, from dealing with outages and evaluating performance monitoring services, to the impact of virtualization. Get expert tips to optimize your Web apps. Learn More Now

Ubiquitous broadband poses problem for cyber security
Symmetric, high speed, ubiquitous broadband will lead to a big increase in cyber crime, according to a cyber security expert. Read More

Bank, customer settle suit over $800,000 cybertheft
An unusual lawsuit between a bank and a customer victimized by cyberthieves was quietly settled last week. Read More

Sneaky browser 'tabnapping' phishing tactic surfaces
All of the major browsers on Windows and Mac OS X are vulnerable to a sly new attack tactic dubbed "tabnapping" that can dupe users into giving up passwords by secretly changing already-open browser tabs. Read More


WHITE PAPER: Riverbed

Overcome Two Key Challenges with Virtualization
How do you accelerate virtualization for your enterprise - and take IT flexibility and cost savings to the next level? Start by downloading this whitepaper from Riverbed. WAN optimization is a class of technology that has rapidly been adopted across enterprises in order to address the challenges of bandwidth limitations and latency over the WAN. Click here!

Data breaches not among top concerns for tech firms
Data security and breach prevention ranks low as a risk factor for most big technical companies, according to new research that identifies the most widespread concerns among the 100 largest U.S. public technology companies. The research, released by BDO, a professional services firm, examines the risk factors listed in the fiscal year 2009 10-K SEC filings of the companies; the factors were analyzed and ranked in order by frequency cited. Read More

Arrogant lawyers: the greatest threat to your organization
While security professionals typically think of computer hackers, malicious insiders, naive employees, or the like as the greatest threat to an organization, I am quickly learning that arrogant lawyers can be the most devastating threat an organization can face. Frankly, the lawyers should be non-issues, but they can get their companies involved in things that should otherwise be avoided. Read More

Google's Pac-Man freaks out Firefox users
Google's celebration of the 30th anniversary of Pac-Man last week flooded Mozilla's Firefox support forum with complaints about siren sounds and offbeat music. Read More

Benefits of Google Encrypted Search
Google launched a new beta service this week--encrypted search using SSL (secure sockets layer) to protect searches from being snooped or intercepted while traversing the Internet. Encrypted Google search is still not entirely private, but it has benefits for individuals and businesses to ensure sensitive information is not exposed to prying eyes. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

15 copies of CCNP ROUTE study kits available and 15 copies of Unix and Linux System Administration Handbook up for grabs, too.Deadline May 31.

SLIDESHOWS

40 days of summer (gadgets)
Summer's here and the time is right for looking at gadgets to make the summer days and nights go by easier or more fun at least. If you're going outside to enjoy the sun, hitting the road for a long road trip to a vacation destination, or just staying at home for the perfect "staycation", here are 40 devices or apps we think you'll like.

What if tech companies owned the Wonders of the World?
In this slideshow, we'll take a look into a future where broke governments are forced to sell their most treasured landmarks to the world's richest nerds.

MOST-READ STORIES

  1. Chinese Web site leaks photo of white iPhone 4G
  2. 40 days of summer (gadgets)
  3. Cisco's NAC goes off track, customers taken aback
  4. NAC: What went wrong?
  5. Is Facebook truly sorry for its privacy sins?
  6. The iPad strikes out at Yankee Stadium
  7. Red Hat exec: Oracle's not an open source company
  8. What if tech companies owned the Wonders of the World?
  9. Swap sites gaining popularity
  10. Deeper Windows Phone 7 details continue to surface

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: