Search This Blog

Thursday, May 26, 2011

Google patches critical Chrome bugs

Aggressive spammers set up their own URL-shortening sites | 5 ways to stay safe from fake anti-virus malware attack on Macintosh

Network World Security

Forward this to a Friend >>>


Google patches critical Chrome bugs
Google on Tuesday patched several vulnerabilities in Chrome, including two a French security company said could be used to bypass the browser's anti-exploit technology. Read More


WHITE PAPER: Dell

Foundations of Security Information Management
This guide examines the details of each of these processes and provides best practices to build a foundation for SIM. Learn more.

WHITE PAPER: Dell

Converged Communications: People and Applications in Synch
Most small and midsize organizations find implementing unified communications a daunting task, between lack of in-house expertise and complex integration issues, it's easy to back burner this project. Find out how to implement a communications strategy in this Collaboration KnowledgeVault. Learn more

Aggressive spammers set up their own URL-shortening sites
Spammers are experimenting with a new tactic to improve their success rate: setting up their own URL-shortening sites as a way to dodge anti-spam software and avoid protections put in place by legitimate URL-shortening sites. Read More

5 ways to stay safe from fake anti-virus malware attack on Macintosh
Macintosh users are finding out the hard way what Microsoft Windows users have known for a long time: Criminals want to sell them fake anti-virus software by scaring them with lies that their computer is infected. Read More

DARPA challenge offers public $100,000 for small unmanned aircraft
If you think you can build the next generation of unmanned flying aircraft, the scientists at the Defense Advanced Research Projects Agency (DARPA) want to hear from you. DARPA and the Space and Naval Warfare Systems Center want "everyone from scientists, engineers, citizen scientists and dreamers" to collaborate and build a small unmanned aircraft for its $100,000 UAVForge Challenge. Read More


WHITE PAPER: F5 Networks

Manageable Application Security
Investments in security solutions have to provide a clear value, which equals additional time spent collecting and documenting proof of this value. The latest version of F5 BIG-IP Application Security Manager(tm) (ASM), v10.1, addresses information overload and the need for agility in implementation. Learn more!

Checking In On Check Point
I attended the Check Point analyst event on Monday of this week in Chicago. It's been a while since Check Point got the analysts together so there was plenty of catching up to do. Read More

Department of Energy brings public electric car recharging stations online
The Oak Ridge National Laboratory today said it had completed the first 25 of 125 solar-assisted electric vehicle charging stations between Knoxville and Memphis, Tenn. Read More

An EU firewall won't protect kids, says top legislator
The European Union's top legislator on digital issues has said that education and awareness are the best way to protect children online, dealing a blow to plans for a so-called European Union firewall. Read More


WHITE PAPER: IBM

Discover the Mishaps of Digital Channels
Digital has been widely embraced by consumers and by many parts of the enterprise. But the adoption of digital channels - Web sites, mobile apps, online sales and customer service, and other smart touches - has often occurred in a piecemeal way. Read More

PlayStation Network and Cloud Security
Pundits around the industry are using the repeated – and successful -- attacks on Sony's Playstation Network as proof clouds aren't secure.  But what's "cloudy" about PSN?  It is the antithesis of the cloud: a closed architecture, which happens to use the internet to connect locked-down clients (PS3s) to a closed, proprietary server (PSN). Read More

Münchhausen Syndrome by Internet: Deceiving the sympathetic
A recent development along these lines that may concern tech-savvy readers is a similar disorder that some specialists are calling "Münchhausen Syndrome by Internet." Some disturbed people have been found to lie about their real or even nonexistent illnesses, apparently to obtain attention and psychological support from well-meaning participants in mental-health or illness-related support groups online. Read More

Russian company cracks iOS 4 hardware encryption
Having cracked Apple iPhone backups last year, Russian security company ElcomSoft appears to have found a reliable way to beat the layered encryption system used to secure data held on the smartphone itself. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from Cisco Subnet: 15 copies of IPv6 for Enterprise Networks. Enter here.

SLIDESHOWS

7 things we love about Drupal 7
Drupal. the open source Content Management System (CMS) used to power everything from personal sites to the White House's Web site, is legendary for its flexibility and power. Here are the best things about it.

MOST-READ STORIES

  1. Microsoft offers students a free Xbox with new Windows 7 PCs
  2. Researchers crack Microsoft, eBay, Yahoo, Digg audio captchas
  3. Cisco adds IPv6 migration features to routers
  4. 7 things we love about Drupal 7
  5. Apple of my eye? U.S. fancies a huge metaphor repository
  6. Lack of IPv6 traffic stats makes judging progress difficult
  7. Hotmail exploit silently snooped
  8. T-Mobile's data cap embrace leaves Sprint as lone 'unlimited' 4G carrier
  9. Microsoft online chief: "I would never log into a Chromebook"
  10. Dimension Data finds vulnerabilities on Cisco devices

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: