Jumat, 10 Februari 2012

Valentine's Day Patch Tuesday: Microsoft to issue 9 patches, 4 critical

FBI opens thorny Steve Jobs 1991 investigation file | IT Networking Organizations In a State of Transition

Network World Security

Forward this to a Friend >>>


Valentine's Day Patch Tuesday: Microsoft to issue 9 patches, 4 critical
Microsoft Thursday said that the second Patch Tuesday of 2012 will see nine security bulletins, four of which were deemed critical. Read More


WHITE PAPER: Google Apps

Google: Security for Google Apps Messaging & Collaboration
This paper will explain the ways Google creates a security-based platform for offering its Google Apps products, covering topics like information security, physical security and operational security. Read now.

WHITE PAPER: Riverbed

Accelerate WAN File Transfers by 50x
According to Taneja Group research, 83% of IT managers are considering a move to the cloud a top priority. This paper highlights their research and provides guidance on how to overcome cloud adoption barriers and further leverage virtualization and consolidation efforts by strategically deploying WAN optimization. Read now!

FBI opens thorny Steve Jobs 1991 investigation file
The FBI today released a background check it did on Apple's founder Steve Jobs founder when he was being considered for a position on George H.W. Bush to the President's Export Council in 1991. Read More

IT Networking Organizations In a State of Transition
In a number of recent blogs, I've described an ESG thesis called data center networking discontinuity. Simply stated, data center networking discontinuity describes the growing gap between data center scale and complexity on one hand and legacy data center networking equipment and manual management and operations on the other. Read More

Google to users: "Hey dummies! Don't root your Android phone and expect Google Wallet to be safe!"
So website categorization company zvelo caused a wee bit of a stir today when it exposed a potential security vulnerability in Google's near field communications (NFC)-enabled Google Wallet mobile payment platform. You can see a video of their efforts below: Read More


WHITE PAPER: Raritan

Data Center Transformations
This paper discusses ways to simplify data center transformation and introduces a new process – BOCA – Build Outs, Consolidations and Acquisitions. Learn the five stages of BOCA and see how the right remote access and IT infrastructure management tools, deployed early and continuously monitored, can dramatically improve overall efficiency. Read now!

Citadel banking malware is evolving and spreading rapidly, researchers warn
A computer Trojan that targets online banking users is evolving and spreading rapidly because its creators have adopted an open-source development model, according to researchers from cyberthreat management firm Seculert. Read More

Security Experts Ask House for Light a Regulatory Touch
Technology industry representatives -- looking to prevent an additional set of compliance requirements -- urge House subcommittee to avoid new cybersecurity regulations to shore up the nation's digital defenses. Read More

IBM spins ultrasharp nanomanufacturing tool 100,000X smaller than a pencil tip
IBM says it has developed a silicon carbide tip for nanomanufacturing applications that it claims is a thousand times more wear-resistant than current tool bits and 100,000 times smaller than a pencil tip. IBM scientists say the the new tip can be used to fabricate all manner of bio sensors, for example for managing glucose levels in diabetic patients or monitoring pollution levels in water. Read More


WEBCAST: HP, Microsoft & Intel

Database Consolidation and Building Your Private Cloud
Please join guest speaker IDC Analyst Carl Olofson as he discusses Enterprise Data Center challenges and why database consolidation is important and necessary. And hear from HP expert Joe Sullivan, who will discuss the HP Database Consolidation Appliance and how it addresses enterprise industry challenges. Learn more

Four crazy tech ideas from Google's Solve for X project
Google promised radical technology proposals would be a part of its Solve for X project and its initial offerings so far haven't disappointed. Read More

Website operator pleads guilty to terrorist threats
The founder of several Muslim jihad websites has pleaded guilty to three charges related to making online threats, including threatening the writers of the television show "South Park," the U.S. Department of Justice said. Read More

Researchers crack satellite encryption
Researchers at a university in Bochum, Germany claim to have cracked encryption algorithms of the European Telecommunications Standards Institute (ETSI) that are used to secure certain civilian satellite phone communications. Read More

Google to pay users to track their movements online
Amid widespread concern about its new privacy policies, Google is now facing criticism over an offer to give users Amazon gift certificates if they open their Web movements to the company in a program called Screenwise. Read More



SLIDESHOWS

Hot authentication tools
User name and password doesn't cut it anymore in the world of online financial transactions. New federal rules call for multi-factor authentication schemes to combat growing threats. The latest multi-factor measures focus on biometrics, advanced analytics, and out-of-band techniques utilizing smartphones.

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. iPad 3 rumor rollup for the week of Feb. 7
  2. Four crazy tech ideas from Google's Solve for X project
  3. 25 techie Valentine's Day gift ideas
  4. Security researchers: 'Did Google pull a fast one on Firefox and Safari users?'
  5. Anonymity bites Anonymous in attempt to extort Symantec
  6. Researchers crack satellite encryption
  7. iPhone 5 release set for summer 2012 -- report
  8. The When, Where and How of Cisco vs. Microsoft for Unified Communications
  9. Swedish e-commerce startup's execs charged in NYC sex crime
  10. Windows 8 strives for optimal battery life

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as zabar.s6.siapa@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


0 komentar:

About This Blog

  © Free Blogger Templates 'Photoblog II' by Ourblogtemplates.com 2008

Back to TOP