Search This Blog

Tuesday, May 22, 2012

Social Networking Security in the Workplace

How to avoid 5 common email management mistakes | Mac-based Flashback click fraud campaign was a bust

Network World Security

Forward this to a Friend >>>


Social Networking Security in the Workplace
At any given moment today, on-the-clock employees are updating their social media status, reading feeds and networking on business media sites. Moments can stretch to minutes: A recent study by the Ponemon Institute found that 60 percent of social media users spend at least 30 minutes a day on these sites while at work. Read More


WHITE PAPER: Fortinet

Next-Generation Security for Enterprise Networks
Since the concept of a 'next-generation firewall' was introduced several years ago by Gartner, many network security vendors have introduced their own next-generation firewalls to address this product category - but with varying results. View Now

WHITE PAPER: Sourcefire, Inc.

Sourcefire FireSIGHT: Context-Aware and Adaptive Security
Learn why Context-Aware and Adaptive Security is the key to effective protection today. View Now

How to avoid 5 common email management mistakes
Email managers have a lot at stake. After all, the volume of global electronic messages sent via email dwarfs all other forms of electronic communication, including social networking. Since the inception of electronic mail, which, according to some Internet historians, can be traced to a small mainframe app called 'MAILBOX' from the mid-1960s, human-to-human messages have been created, transmitted and stored in electronic format. But early email administrators could hardly have envisioned the complexity of current email infrastructure and the concomitant maze of technical, security, business and regulatory challenges. Read More

Mac-based Flashback click fraud campaign was a bust
The hackers in charge of the Flashback botnet managed to generate $14,000 from their click fraud campaign, but have not been paid, Symantec said today. Read More


RESOURCE COMPLIMENTS OF: IT Roadmap Denver

Your IT Career Roadmap
This unique session is designed with you, the IT professional in mind. How can you build your personal brand, and properly design a career plan? How do you work with your staff to create a plan that retains your best talent? Come to IT Roadmap Denver for valuable information on how today's IT leaders build successful careers. Click to continue

Flashback Mac Trojan earned $14,000 from ad clicks, Symantec
Symantec originally thought that at its peek the Flashback Trojan was generating around $10,000 a day by hijacking ad clicks. Now, new research suggests the developers may only have earned $14,000 during the time that the malware was active. Read More

Utah CTO takes fall for data breach
The executive director of Utah's Department of Technology Services has resigned over a data breach two months ago that exposed the Social Security numbers of about 280,000 Medicaid recipients. Read More


WHITE PAPER: Check Point Software

Check Point 3D Security Analysis Report Tool
Reduce security risks with the Check Point 3D Security Analysis tool. This comprehensive security analysis provides an easy-to-read report that summarizes security events, their risks, and remediation. See sample report View Now

Windows 8 Security: What's New
When Windows 8 comes out later this year, the new Start screen and Metro-style apps will likely be the first changes you'll notice, but those aren't the only things that are new. Microsoft is also making some serious security enhancements to help keep your system safer and to improve Windows' ability to combat viruses and malware. It just may be the biggest improvement to Windows security yet. Read More

The SpaceX blast into history
NASA watches as SpaceX gets set for first space shot Read More

Top 20 Windows 8 features
From Metro Start to reduced hardware requirements, here is a look at the best new features Windows 8 users will love Read More

Rogues gallery 2: Ten infamous hacks and hackers
From low-profile intrusions to statement-making break-ins, here are 10 headline-making system intrusions (and the culprits behind them) Read More



SLIDESHOWS

10 ways to make Android faster, more productive and more secure than iPhone
iPhone users love to brag about their phones. Yet, for many users, Android is clearly the superior platform.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. China approves Google acquisition of Motorola Mobility
  2. HP's layoff plans and what they mean
  3. How to avoid 5 common email management mistakes
  4. iPhone 5 rumors for the week ending May 18
  5. Anonymous hater claims responsibility for Pirate Bay DDoS attack
  6. Cisco's wireless unit shifts emphasis to 'mobility'
  7. iPhone 5 said, again, to have 4-inch display
  8. Ethernet switching gets specialized
  9. U.S. report defines China's cybersecurity, space-based threats
  10. Android, Samsung top smartphone sales, topping Apple's iPhone

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: