Friday, April 16, 2010

Anti-virus/anti-malware cheat sheet; Gmail spam spreading malware

Gmail spam uses fake addresses to spread malware | New healthcare IT compliance service protects electronic medical records

Network World Compliance

Forward this to a Friend >>>


Anti-virus/anti-malware cheat sheet
Keeping up with the latest in anti-virus and anti-malware news can be a challenge for even the most diligent IT professional. This Network World "Anti-virus/anti-malware cheat sheet" is designed to give you a leg up on the latest news, trends, analysis and opinion in this most critical of IT subject areas. Read More


WHITE PAPER: APC by Schneider Electric

Top 10 Server Cooling Approaches
High-density servers can present a significant cooling challenge demanding over 40kW of cooling per rack. With most data centers designed to cool an average of no more than 2kW per rack, innovative strategies must be deployed. This paper provides 10 approaches to increase cooling efficiency, cooling capacity and power density. Read Now.

WHITE PAPER: Cisco Systems Inc.

Peace Corp: Creating a worldwide unified network
Learn how the Peace Corp made its unified network a reality after selecting and deploying cost-effective WAN optimization gear. One of the key factors was selecting a platform that integrated with its existing network spanning 70 countries. The result is dramatically improved performance and significant cost savings. Learn More

Gmail spam uses fake addresses to spread malware
Gmail spam is on the rise. Spammers are using fake Gmail accounts to clog up in-boxes, making 'Gmail.com' the most abused domain name, according to Commtouch's quarterly Internet Threats Trend Report. Read More

New healthcare IT compliance service protects electronic medical records
The healthcare industry has the highest mobile intensity of all industries. According to Forrester Research, 89 percent of healthcare businesses are highly mobile. Unfortunately, Forrester also reports that 31 percent of these businesses had an instance of data loss in 2009. As a result, 63 percent rank "understanding the risks and vulnerabilities" as the top challenge when it comes to mobile devices. Now there is a new cloud-based IT compliance service that aims to mitigate the risks and reduce the vulnerabilities that are specific to healthcare businesses. Get a free trial of the service and see if it's right for your business. Read More

Legal Hold Software: Features and Evalution Criteria
Legal hold software helps preserve data and reduce legal hassles. Here's what to look for in a system. Read More

Man who left USB drive in shared PC waived privacy claims, court rules
A person who forgot to remove a thumb drive from a shared computer that he was using waived his privacy claims to the content on that device, a federal judge in Florida has ruled. Read More

Hackers try to exploit illegal downloading fears
Hackers are exploiting the controversy surrounding illegal downloading in a bid to steal credit card details from web users, says F-Secure. Read More


WHITE PAPER: NetApp

Top 5 Hyper-V Best Practices
Read this whitepaper to get advice on everything from making sure you configure enough network connections, especially in iSCSI, to specifying the specific initiator groups and the correct LUN type when provisioning the NetApp LUN for use with Hyper-V. Learn More!

Apache project server hacked, passwords compromised
Hackers broke into a server used by the Apache Software Foundation to keep track of software bugs. Read More

Facebook Overhauls Safety Center
In the wake of high profile cyber-bullying cases -- such as the one that led to a teenage suicide in 2006 -- social networking sites have been tightening the belt on Internet security. Pushing itself to the forefront, Facebook has overhauled its Safety Center with descriptive information for teens, parents, law enforcement officials, educators and general users to help protect themselves against scammers, bullies and other riffraff. Read More

In data breaches, keeping number of records lost secret can protect stock prices
When companies publicly declare that they have suffered a data breach, it's best not to reveal how many individual records were involved if they don't want to take a hit in their stock prices, according to a study. Read More

Social media isn't friends with enterprise security
Security threats are changing as enterprises embrace the use of social media sites. Security experts at Forsythe, Info-Tech and nCircle weigh in on how IT can adjust to accommodate the new risks. Read More

Hackers exploit new Java zero-day bug
Just five days after a Google researcher published information of an unpatched Java bug, a compromised song lyrics site is sending users to a Russian attack server exploiting the flaw to install malware. Read More


WHITE PAPER: Oracle

Oracle Accelerate - Not Just Smart But Timely
This video highlights the Oracle Accelerate program - a group of pre-configured, tested solutions that combine Oracle enterprise applications and rapid implementation tools with industry-specific bundles. The program reduces the time, complexity and cost of deploying Oracle and is implemented by highly trained partners. Learn More.

Apple patches Pwn2Own bug
Apple today patched a critical Mac OS X vulnerability used by a security researcher three weeks ago to win $10,000 for hacking Safari at the Pwn2Own contest. Read More

Identity theft fears weigh on Americans
Most Americans remain afraid of identity theft, but their level of anxiety is increasing, according to a survey by Unisys. Read More

Patch Tuesday: Microsoft safeguards video, Adobe secures PDFs
Microsoft unloads 11 updates for 25 vulnerabilities on Patch Tuesday while Adobe also gets IT managers' attention with its security advisory for Adobe Reader and Acrobat. Read More

Virtualization and cloud security modeled on NAC
Virtualization and cloud computing have disrupted the security industry to its core. We have not quite figured out how to deal with very dynamic infrastructure while most security is implemented in a mostly static ring of devices surrounding the resources they protect. Read More

How security professionals monitor their kids
Cell phones, texting, IM, email, Facebook, MySpace--kids are interconnected today in ways hardly imagined two decades ago. But these technology-based communication platforms also enable new forms of an age-old parenting strategy: monitoring your kids. Who are they talking to? What are they talking about? Are they going where they said they are going? Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

15 copies of CompTIA A+ study kits (book, video, flash cards) are available from Cisco Subnet.Deadline April 30. 15 books on Microsoft Systems Center Enterprise suite are available, too.

SLIDESHOWS

10 useful Google Chrome Experiments
Google's Chrome Experiments is a Web site that showcases JavaScript programs which deliver a rich user-graphics experience. To date, there are about 80 projects featured on Chrome Experiments. Here are the 10 most useful.

Interop history quiz
The venerable networking tradeshow Interop convenes this month in Las Vegas. Answer the following 10 questions about Interop, keep score and see how you stack up at the end.

MOST-READ STORIES

  1. Cisco product delays opening doors for rivals
  2. Apache project server hacked, passwords compromised
  3. Would your spouse leave you if you did this to your residence?
  4. Fedora 13 beta released with many goodies for the enterprise
  5. Twitter to start pushing advertising to users
  6. Steve Jobs confirms no more support for original iPhone
  7. VMware, Salesforce.com to unveil cloud computing service
  8. Meet the MacBook Pro's Core i5 and i7 chips
  9. How to get the best cell phone service possible
  10. Man who left USB drive in shared PC waived privacy claims

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: