Search This Blog

Wednesday, September 28, 2011

Microsoft offers ideas for users to beat the BEAST threat

IBM Demonstrates Secure Product Development Leadership | Borders' customers will have to opt-out after Barnes & Noble agrees to acquire database

Network World Security

Forward this to a Friend >>>


Microsoft offers ideas for users to beat the BEAST threat
Microsoft is urging customers to update vulnerable versions of SSL to a newer one that is not susceptible to a recently published exploit called BEAST, but in the meantime it recommends steps that lessen the risk of being victimized. Read More


WHITE PAPER: GFI Software

Why Customers Love VIPRE Business
Selecting an antivirus solution for your organization is an important decision. VIPRE Antivirus Business is a high-performance solution that delivers fast, memory-efficient endpoint security with all the necessary functionality you need and nothing you don't — ensuring an optimal end user performance experience. Read now!

WHITE PAPER: ExtraHop

Application Performance Management
In this eGuide, Network World, with sister publication CIO, offer news on the latest trends, best practices, and straightforward advice on these solutions and the challenges of managing application performance. Learn More!

IBM Demonstrates Secure Product Development Leadership
It's easy to believe that the folks who design, develop, and distribute the technology we use know what they are doing and have our collective best security interests in mind. Sadly, this isn't at all true. Many vendors focus solely on feature/functionality and disregard security in their product development and manufacturing. Others downplay risks believing that their technology sits well "behind... Read More

Borders' customers will have to opt-out after Barnes & Noble agrees to acquire database
After arguing in court over privacy concerns from the sale of bankrupt Borders customer loyalty database to Barnes & Nobel, the lawyers in the case agreed to email customers and give them 15 days to opt out of the system. Read More


WHITE PAPER: Palo Alto Networks

Understanding and Selecting an Enterprise Firewall
This Securosis white paper analyzes the disruption happening at the enterprise perimeter, the various technical architectures capable of addressing the new requirements, and deployment considerations for optimal security, availability, and performance. Read now!

Al-Qaida's Shamukh chat forum under attack, says expert
Al-Qaida's top-tier Al-Shamukh chat forum is facing an ongoing electronic attack, that has rendered the forum totally unreachable, according to a terrorism expert. Read More

Striking a domain provider, Microsoft kills off a botnet
Microsoft has opened a front in its ongoing battle against Internet scammers, using the power of a U.S. court to deal a knockout blow to an emerging botnet and taking offline a provider of free Internet domains. Read More


WHITE PAPER: Raritan

Best Practices: KVM Smart Card Authentication Systems
Selecting a smart card-enabled KVM system? Choose one that supports PKI authentication to multiple servers from a single location and makes the necessary KVM feature adjustments to enable seamless use of the reader. This White Paper examines best practices when evaluating a Smart Card solution. Learn More

NASA warns of geomagnetic storm after behemoth solar flare
NASA today said a strong-to-severe geomagnetic storm is in progress following a massive solar flare and coronal mass ejection (CME). Read More

Civil liberties groups slam EU data retention as unnecessary
A large group of digital rights organizations has demanded proof from the European Commission that the retention of data in the European Union is necessary and proportionate for fighting serious crime. Read More

Scammers pretend to be friendly office printers
Hackers have found a new hook to trick people into opening malicious attachments: send emails that purport to come from office printers, many of which now have the ability to email scanned documents. Read More

See you anon: Reflections on online anonymity
I've never been much of a fan of anonymity. Long-established research in social psychology pointed out that anonymity increases anti-social behavior. Read More



SLIDESHOWS

Geekiest cupcake designs
From mainstream iPhone and Google icons to geeky Ubuntu and Big Blue logos, cupcake bakers have taken inspiration from technology for their complex fondant-and-frosting structures. Here are some of our photogenic favorites.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center and Microsoft training of the winner's choice from Webucator.. Enter here.Also: Please take our survey on certifications and your career

MOST-READ STORIES

  1. Juniper takes on Cisco, HP in 'simple' networking
  2. YouTube founders breathe new life in Delicious
  3. Reimagining Microsoft without Ballmer
  4. Scammers pretend to be friendly office printers
  5. Is quantum computing real?
  6. Amazon's new tablet: What to expect
  7. Windows 8 coming in 2012? 6 reasons why this could derail Windows 7 now
  8. Q&A: Sprint's take on the future of mobile device management
  9. Microsoft offers ideas for users to beat the BEAST threat
  10. Telework controversy: Are 17% of teleworkers unabashed slackers?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: