Search This Blog

Thursday, November 29, 2012

Is Windows 8 really a sitting duck for malware?

  Latest Java zero-day exploit renews calls to disable it | DEA issues extortion scam warning involving Internet drug buys
 
  Network World Security

Forward this to a Friend >>>


Is Windows 8 really a sitting duck for malware?
A new report released by the security firm Websense Security Labs claims Windows 8 will become one of the top three most-hacked platforms in 2013 because of its newness and Microsoft's efforts to encourage development for the radical new platform. Yeah, that didn't make sense to me, either. Read More


RESOURCE COMPLIMENTS OF: Solutionary

Gartner: Magic Quadrant for MSSPs, North America
Enterprises that optimize their use of MSSPs can free up internal staff time to respond to more-business-critical security functions if they select MSSP services that can support and complement internal security operations. Download the 2012 Gartner Magic Quadrant for MSSPs, North America to see how the vendors in the market are evaluated.

RESOURCE COMPLIMENTS OF: LogMeIn

LogMeIn Central: Automate, Monitor and Manage PCs.
LogMeIn lets you Monitor and Manage PCs, deliver patches and updates to multiple PCS simultaneously. Central helps IT deliver seamless support that keeps employees productive and up and running. LogMeIn Central - automate routine tasks and do more. Free Trial

Latest Java zero-day exploit renews calls to disable it
A zero-day Java exploit found for sale in the criminal underground has renewed calls to disable the cross-platform runtime environment in Web browsers. Read More

DEA issues extortion scam warning involving Internet drug buys
The Drug Enforcement Administration today issued a public warning that criminals posing as DEA agents have apparently amped up an old scam to steal consumers' money. Read More


RESOURCE COMPLIMENTS OF: Ipswitch

Wired & Wireless Networks? WhatsUp Gold can help!
As an IT manager, you're busy taking care of the availability, performance & security of your company's IT infrastructure. But things like BYOD, rogue devices, AP over-subscription & bandwidth policy abuse can make that complex. WhatsUp Gold provides ONE dashboard to visualize, isolate & resolve wireless problems before they impact your organization. Stop being the last to know about your wireless issues- Try WhatsUp Gold free for 30 days!

Texas School RFID student tracking conflict headed for Federal court
Opinions about RFID have long been controversial, but no more so than when a Texas school tried to suspend a girl for refusing to wear a student ID card embedded with an RFID chip. By forcing students to hang the ID card around their necks and to keep it visible at all times, the school claims it is guaranteed proof of class attendance or absence. Read More

Hackers steal experts' email addresses from International Atomic Energy Agency server
A group of hackers leaked email contact information of experts working with the International Atomic Energy Agency (IAEA) after breaking into one of the agency's servers. Read More


WEBCAST: PhoneFactor

Strong Security for Remote Workers Is Just a Phone Call Away
Live Webcast: Thursday November 29th at 2:00pm Join Steve Dispensa, PhoneFactor Chief Technology Officer, and Sarah Fender, PhoneFactor Vice President of Marketing & Product Management, to learn how phone-based authentication is helping companies tackle complex authentication challenges. Learn More

Vendors join fight to secure privileged access
It is a battle to protect the privileged. But in this case, it is not the 1%. This is about privileged access accounts within critical infrastructure (CI) control systems. Read More

If ECPA is tweaked to protect email privacy, will the NSA still spy on US Tor users?
The more you try to protect your online privacy by using encryption, the more the government may consider that a potential threat and break into the cloud to access your stored communications. This is one more reason that the ECPA needs to be updated. But the more you protect your privacy by using Tor or a VPN service, if that IP makes you look like you are on foreign soil, does that mean the U.S.... Read More

 
 
 

SLIDESHOWS

Cool Yule Apps
13 new things to put onto your iPad or tablet.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Alcatel-Lucent to take on Cisco, VMware in crowding SDN field
  2. User ranked top LTE smartphones
  3. Android Jelly Bean resurrected my HP Touchpad
  4. Cisco, other router rivals challenged by economy, competition
  5. Windows XP's countdown to retirement: T-minus 500 days
  6. 2013 IT salaries: 15 titles getting the biggest pay raises
  7. McAfee wants his guns back, admits poor aim
  8. 10 great work tools we can't live without
  9. Antivirus software a waste of money for businesses, report suggests
  10. Company denies being bought by Google
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: