Search This Blog

Thursday, June 30, 2011

Microsoft Researchers Find Spammers by Graphing Social Networks

Google patches 7 bugs in Chrome browser | Inventor of SecurID token has new authentication system

Network World Security

Forward this to a Friend >>>


Microsoft Researchers Find Spammers by Graphing Social Networks
Do you believe in the theory that only good people have lots of social media friends, while "bad people" don't have friends and don't leave many traces of themselves online? According to recent Microsoft Research, a spammer email account can be identified by the lack of connectivity to other people. Read More


WHITE PAPER: IBM

Managing Data and Application Security Risks
This whitepaper shows how organizations can manage data and application security risks cost-effectively by using IBM Tivoli Data and Application Security to reduce costs and improve ROI. It provides examples of IBM customers who have realized the benefit Read Now

WHITE PAPER: Extreme Networks

Identity-Aware Networking
Download this whitepaper today discover how IT can integrate identity and networking, enabling new business processes and easing regulatory compliance while improving security. Read now!

Google patches 7 bugs in Chrome browser
Google patched seven vulnerabilities in Chrome on Tuesday as it issued the second security update for its browser this month. Read More

Inventor of SecurID token has new authentication system
The inventor of the two-factor authentication SecurID token says the latest technology he's come up with is better because it can be used with a voiceprint biometric, plus it can be deployed for purposes of secure authentication in mobile phones, payments and cloud computing. Read More


WHITE PAPER: Raritan

Introduction to Data Center Infrastructure Management
This paper looks at how DCIM products can help you streamline operations, automate asset management, optimize resources and reduce costs. Read More

OECD declaration on Internet policy angers EFF
The OECD on Wednesday issued a communication on developing Internet policy that appears to put pressure on Internet service providers (ISPs) to take responsibility for policing their networks. Read More

MasterCard blames ISP outage for site's downtime
MasterCard said on Wednesday that its main website was offline for a short period of time due to a weather-related issue at a third-party ISP and not a distributed denial-of-service (DDOS) attack as claimed by WikiLeaks. Read More


WEBCAST: Cymphonix

Gain Complete Control Over Internet Bound Traffic
The Cymphonix Network Composer is the only network appliance that provides comprehensive clarity into all internet bound network traffic and simply powerful tools to manage that traffic with a holistic approach. Learn More Today!

The Network Performance Management Challenge
There is no question that server virtualization can help organizations reduce costs while streamlining operations. I constantly here stories about server provisioning going from weeks to hours now that it is as simple as spinning up a new VM. In theory, this will get even easier as IT develops applications on top of cloud platforms like Azure, AWS, and Google App Engine while leaving all of the infrastructure... Read More

Better security needs 'more informed patching'
Security firm Secunia finds that the most popular three-dozen programs account for 80 percent of vulnerabilities. Better patching could help security, but not everyone agrees. Read More

9 gigantic bonuses that make yours look like chump change
Big bonuses are back. Nine tech CEOs received cash bonuses of $3 million or more in 2010, and another 13 netted at least $1 million in cash payouts. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Microsoft Subnet: A set of classes for a Microsoft Cert from Webucator and Polycom videoconferencing system. Enter here.

SLIDESHOWS

12 of the slickest designs in enterprise tech gear available today
Consumer devices tend to get all the praise for their designs, but there's plenty of cool equipment to be found in the enterprise market. When hardware vendors tag-team with renowned industrial designers, the results can be impressive. Here are some of our favorites.

MOST-READ STORIES

  1. Cisco's Cius tablet to ship next month
  2. Gigabit Wi-Fi spec edges closer to reality
  3. Facebook bans KDE application, deletes user photos
  4. Symantec finds big differences in iOS, Android security
  5. Volume of data darn near indescribable ... without the iPad
  6. Geekiest wedding dress ever
  7. Microsoft patent may ruin Skype
  8. Zillow's rewrite of real-estate history upsets some homeowners
  9. Microsoft launches Office 365, glosses over cloud limitations
  10. Apple warned of phishing attack threat

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: