Friday, March 15, 2013

Security of open-source software again being scrutinized

  10 top Google Reader alternatives | How to blunt spear phishing attacks
 
  Network World Compliance

Forward this to a Friend >>>


Security of open-source software again being scrutinized
A recent round of flaws discovered in open-source software has reignited concerns that security is getting bypassed in the rush to continue expanding the large and extremely popular code base used by millions. Read More


RESOURCE COMPLIMENTS OF: InterMapper

The #1 real-time network mapping and monitoring tool.
InterMapper provides an at-a-glance, real-time view of your network devices, services, applications, connections and traffic patterns. Drilling down on maps uncovers details needed to fix performance problems. It is an industrial strength monitoring, mapping and alerting tool that empowers network administrators to maintain healthy IT environments.

WHITE PAPER: Cisco Systems

Mobilize: A unified IT approach to the mobile workspace
Why does unification matter for today's enterprise? The answer can be found by looking to today's defining trends. The consumerization of IT, BYOD, mobility-based business models--they're all transforming how employees work and customers engage. Read Now

10 top Google Reader alternatives
The tech world in general, and tech media in particular, greeted the announcement of Google Reader's upcoming demise with widespread frustration and angst. While we can't do anything about the July 1 shutdown of Google's popular RSS reader, we can at least point you in the direction of some possible ways to fill the void. Read More

INSIDER
How to blunt spear phishing attacks
According to Allen Paller, director of research at the SANS Institute, 95% of all attacks on enterprise networks are the result of successful spear phishing. In other words, somebody received an email and either clicked on a link or opened a file that they weren't supposed to. Read More

Researchers resurrect and improve CRIME attack against SSL
Two researchers from security firm Imperva have devised new techniques that could allow attackers to extract sensitive information from users' encrypted Web traffic. Read More

Startup brings digital rights mgmt. to iPhone, iPad, Android and Windows Phone
Startup Watchful Software says it's reviving the technology known as digital rights management (DRM) by expanding it beyond traditional platforms like Microsoft Windows PCs and bringing it to mobile devices such as iPhone, iPad, Android and Windows Phone. Read More


WHITE PAPER: Netscout Systems Inc.

Service-Oriented Performance Management Strategy
This white paper is to help IT organizations adopt a management methodology that enables them to improve the user experience by focusing on service delivery management. Learn More.

Wealth of data online likely made posting celebrity credit reports easy
Privacy experts say following hack that a savvy person could easily find enough data to obtain a credit report from Annualcreditreport.com Read More

Little sympathy for merchants in disputes over PCI violations
Genesco files $13M suit, arguing penalties from banks processing credit-card payments occurring without evidence card data has been stolen Read More

What you 'Like' in Facebook can come back to haunt you
Researchers find correlation between 'likes' and sexual preference, drug use and race Read More

Cross-platform malware that hit tech giants had specific targets
Apple, Facebook, Microsoft and Twitter acknowledge finding the Trojan in employee computers, but provide little information to security firms Read More


WHITE PAPER: Ipswitch, Inc. – Network Management Division

Three Tiers of BYOD – What You Get for What You Pay
Love it or hate it, bring-your-own-device (BYOD) was affecting security and network performance long before it became the industry's newest buzzword. Proponents suggest that BYOD will make more room in the budget, and on the surface it seems like a cost-cutter. Learn more.

Apple patent targets social network stalkers and spammers
U.S. Patent Office awards IP for data management in social networking context Read More

New Google site aimed at helping webmasters of hacked sites
Google has launched a site for webmasters whose sites have been hacked, something that the company says happens thousands of times every day. Read More

Cisco joins with Arbor Networks to fight DDoS attacks
Cisco has begun streamlining distributed denial-of-service (DDoS) attack defense by offering Arbor Networks technology on its carrier class routers. Read More

4 Internet privacy laws you should know about
Last year after an outpouring of opposition, Internet advocates logged a victory when they defeated the controversial Stop Online Piracy Act (SOPA). Read More

 
 
 

SLIDESHOWS

How different tech degrees measure up

Here's our list of lucrative tech degrees, ranked from lowest to highest starting salary.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 10 awesome ways to celebrate Pi Day 2013

2. Lawyer registered PopeFrancis.com … 3 years ago

3. iPad 5 rumor rollup for the week ending March 13

9. Google Reader axed along with several other services

5. Cheeky browser plug-in paddles 'cloud' peddlers

6. Users flock to Japan student's firewall-busting thesis project

7. Turing Award goes to MIT crypto experts Goldwasser and Micali

8. Windows 8: How to solve the Start Button dilemma

10. NASA's inspector general paints bleak picture for agency projects, IT security

4. Security of open-source software again being scrutinized

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: