Search This Blog

Friday, July 29, 2011

Anonymous claims to have breached ManTech International's network

Apple has more cash the US government! Buyout not imminent though | Malwarebytes preps enterprise edition of PC-cleaning software

Network World Security

Forward this to a Friend >>>


Anonymous claims to have breached ManTech International's network
A tweet sent by the hacker group Anonymous at midnight yesterday claims the group has broken into the network of defense contractor ManTech International and intends to release seized documents within 24 hours. Read More


WHITE PAPER: F5

Magic Quadrant for Application Delivery Controllers, 2010
The market for ADCs is consolidating. However, innovation continues, especially among some select smaller players. Although there are clear leaders in the ADC market, enterprises should focus their buying decisions on a vendor's ability to support specific application requirements. Learn more!

WHITE PAPER: Riverbed

Streamlined Data Protection
One of the greatest challenges today is effectively backing up and protecting the vast amounts of data stored throughout an organization. With WAN optimization, you can accelerate network-based backup by 5x and can reduce bandwidth use by up to 95%. Download this paper and learn more about this strategy today. Learn More

Apple has more cash the US government! Buyout not imminent though
Given the current level of disarray and ineptitude of the elected officials in Washington DC right now this news probably shouldn't be all that shocking: Apple with its $76 billion in the bank has more cash than the US with its almost $74 billion. The news has prompted a variety of reactions. More wacky news: 20 of the weirdest, wackiest and stupidest sci/tech stories of 2011 (so far!) Read More

Malwarebytes preps enterprise edition of PC-cleaning software
Malwarebytes this fall expects to release an enterprise-grade anti-malware platform that it says doesn't compete directly with traditional antivirus software because it relies more on observing how the malware acts and less on seeking code signatures. Read More

Microsoft fixes Mac Office bug in Apple's Lion
Microsoft Thursday released an updated version of Communicator for the Mac that works with Apple's Lion operating system. Read More


WHITE PAPER: BMC

Benefits of an ITIL Help Desk in the Cloud
You can implement help desk processes based on ITIL easily with reduced up-front costs and automatic upgrades. Used by more than 72,500 companies worldwide, the Force.com platform is the most widely used Cloud platform in the world. Read More

E-commerce sites based on open source code under attack
About 100,000 Web pages for e-commerce sites based on the open source OS Commerce software have been compromised with malware through a mass iFrame injection attack, according to security firm Armorize. Read More

Windows XP PCs breed rootkit infections
Computers running the decade-old Windows XP make up a huge reservoir of infected PCs that can spread malware to other systems, a Czech antivirus company said today. Read More

House panel votes to require ISPs to keep customer records
A House committee passes a bill that would require ISPs to retain customer IP information for a year as a way to combat child pornography. Read More


WHITE PAPER: BMC

Four Steps to Dynamic Workload Management
In the beginning, IT ran on one platform - the mainframe. Workloads were predictable and stable, and we could schedule accordingly. But then came Unix, AS/400, Windows and a multitude of other platforms, all with accompanying workloads. Learn More!

Tenn. BlueCross finishes enterprise-wide data encryption
BlueCross BlueShield of Tennessee said today it has completed a year-long effort to encrypt all of its at-rest data, a move it took after 57 of its hard drives were stolen in 2009. Read More

Sexting: Loss of control = Embarrassment, bullying & potential prosecution
In the first column of this pair of postings, I introduced a discussion of the widespread and increasing practice by young people of sending lewd text and pornographic photos or videos of themselves to friends – only to find the material being distributed publicly and completely out of their control. Today I continue with thoughts on causes and consequences of sexting. Read More

Debt reduction deadlock drags down corporate capital spending on software, more
The U.S. debt reduction deadlock in Congress is already taking a toll on how much companies are spending on property, buildings and equipment, including computer hardware and software, according to a new survey by ChangeWave Research. Read More

When all else fails to protect your network, try game theory
If you're in charge of stopping hackers and malware from getting into your network, you might consider the job anything but a game. But security researchers in academia for years have been applying game theory to try to solve network security challenges. Read More



GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Enter here.

SLIDESHOWS

The Geekiest iPad Apps Ever
We scoured the App Store to find the "geekiest" apps out there for the true purveyor of all things geek.

MOST-READ STORIES

  1. Wham Bam Google Ban: No Pseudonyms on Google Plus Profiles
  2. The 5 biggest IT security mistakes
  3. How to implement IPv6 in a Windows environment: an expert guide
  4. Why I was banned on Google+ (and how I redeemed myself)
  5. 15 incredibly useful (and free) Microsoft tools for IT pros
  6. Cisco rival Juniper lands Microsoft's Muglia
  7. Law firm rallies AT&T customers to block T-Mobile merger with lure of cash
  8. 10 technologies that will change the world in the next 10 years
  9. 10 things you shouldn't be able to buy online
  10. The problem with weak passwords and hijacked Hotmail

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: