Search This Blog

Friday, July 27, 2012

Study: Microsoft repeatedly ranks as top U.S. spammer

Quirkiest Moments at 2012 Black Hat security conference | Iran attacked by prank 'AC/DC' malware, expert reports

Network World Security

Forward this to a Friend >>>


Study: Microsoft repeatedly ranks as top U.S. spammer
Microsoft has topped a list of biggest U.S. spammers for five out of the past 15 months, and for some of those months it ranked No. 1 in the world, according to a University of Texas study to flag the worst offenders in an effort to get them to improve their security. Read More


WHITE PAPER: Xirrus

Tablets in the Enterprise
Tablets are replacing laptops at lightning speed. Whether company-issued or part of the BYOD phenomenon, the increased use of smart devices has resulted in a dramatic shift in network traffic with an emphasis on wireless. This paper explains how to predict Wi-Fi demands and architect a best-fit wireless network strategy for your environment. Learn more.

WHITE PAPER: Cisco

Cisco Bring Your Own Device
This paper explores the challenges mobile devices create for IT, offers key considerations before adopting a BYOD strategy and highlights a comprehensive architecture from Cisco that enables freedom of choice for users while affording IT security and control. Learn more.

Quirkiest Moments at 2012 Black Hat security conference
From half-naked booth reps to colorful robots, it wasn't all about security on the exhibit floor and around the conference Read More


WHITE PAPER: HP

Bring Your Own Mobile Devices to School
In today's educational environments, more and more students, guests, and faculty are bringing in their own Wi-Fi devices into the school's network. This paper discusses the challenges and solutions IT administrators are facing and how to address the security and management of the multiple devices being introduced into the wireless/wired network. Learn more.

Iran attacked by prank 'AC/DC' malware, expert reports
Iran's nuclear program might recently have been attacked by unidentified malware that played Thunderstruck by Anglo-Australian heavy metal band AC/DC as part of its programmed behaviour, a security expert has reported. Read More


WHITE PAPER: Motorola

WiNG 5 Wireless LAN: Delivering Better Quality of Experience
Can your wireless network infrastructure handle the growing numbers of mobile devices taking significant bandwidth bites out of your network? The good news is that with smart, cost-effective wireless infrastructure investments, not only can you scale quickly to secure the growing number of devices you serve, but also optimize their performance. Learn More.

Black Hat: Microsoft incorporates BlueHat Prize finalist defensive tech & releases EMET 3.5 Preview
Microsoft has incorporated into its security toolki tsoftware that fights return oriented programming attacks - technology that was created by a finalist in the company's Blue Hat security research contest. Read More

Obama administration supports new cybersecurity bill
The Obama administration "strongly supports" a new cybersecurity bill even though some provisions are watered down from earlier legislation, the White House Office of Management and Budget said Thursday. Read More

Best practices for printer security
Most companies pay significant attention to protecting data while it is at rest in storage or in use in an application, but what about when data is printed in documents? This could be a security breach waiting to happen. Read More



SLIDESHOWS

18 Notable Apple Alumni
While some with Apple ties are already well-known, others may be surprising to find on the list.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. The day VMware ate Cisco
  2. The 5 hottest IT jobs right now
  3. Windows 8 is a 'catastrophe,' says Valve founder and former Microsoft employee Gabe Newell
  4. Quirkiest moments at 2012 Black Hat security conference
  5. Black Hat: Shark-bitten security researcher takes another chomp out of Oracle database
  6. Researcher wows Black Hat with NFC-based smartphone hacking demo
  7. Google Talk users lash out over major outage
  8. Cisco layoffs this week part of 'Transformation Project'
  9. Earliest known photos of an Apple iPad prototype
  10. Tatu Ylonen, father of SSH, says security is 'getting worse'

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: