Tuesday, February 26, 2013

Windows XP and Firefox browser amass worst vulnerability record over past 25 years

  Windows XP and Firefox browser amass worst vulnerability record over past 25 years | Antivirus's star fades, letting new technologies shine
 
  ITworld Security Strategies

Forward this to a Friend >>>

Google Plus LinkedIn Facebook Twitter


LAST CHANCE: Win a copy of 'Ubuntu Unleashed 2013 Edition'
ITworld is giving away 5 copies of "Ubuntu Unleashed 2013 Edition" to some lucky readers. Hurry! The drawing ends this week. Read More


RESOURCE COMPLIMENTS OF: NetApp

Avoid buyer's remorse.
Virtualize with Agile solutions from NetApp and VMware today. Download the VMware® and NetApp® trial. Learn more www.netapp.com/dataontap

WHITE PAPER: HP

A Universal Log Management Solution
Do you know where your vulnerabilities are? This white paper discusses the log management landscape and the solution that protects modern networks. Learn more.

Windows XP and Firefox browser amass worst vulnerability record over past 25 years
In a look at the number of vulnerabilities recorded over 25 years in software products and open source, a researcher at Sourcefire has determined that Microsoft Windows XP and the Mozilla Firefox browser stand out as the two with the largest number of high-severity vulnerabilities. Read More

Antivirus's star fades, letting new technologies shine
As if you didn't know it already: antivirus software isn't doing its job, even though it sucks up around 30% of IT security budgets. But where can companies turn next? Two firms think they have an answer. Read More

Akamai brews up more delicious Kona security tools
Web acceleration company Akamai today announced Version 2.0 of its Kona Site Defender service, which adds new ways for clients to protect themselves against denial-of-service attacks. Read More

Juniper security products use device-fingerprinting as way to detect, block attacks
Juniper Networks today rolled out a battalion of security products and services to protect corporate networks, stating that when it comes to defensive measures, security attacks can be better prevented by determining device-fingerprinting rather than blocking attacks based on IP address. Read More


WHITE PAPER: Moovweb

3 Steps to a Cost-Effective Mobile Strategy
In the new Moovweb white paper, "Creating the Right Mobile Strategy: What You Need to Know Before You Get Started", get the insight you need to make an educated decision on the move to mobile. Read Now!

Windows 8 picture passwords: Their great untapped potential
Windows 8 lets you use a series of gestures to log into your PC, a minor improvement with big implications. Read More

Trend Micro adds Facebook scanner to mobile security suite
Trend Micro is adding the often confusing world of Facebook privacy settings to a new version of its flagship security software. Read More

Microsoft's Azure service hit by expired SSL certificate
Microsoft's Azure cloud platform faced a worldwide outage in its storage services from Friday afternoon because of an expired SSL (secure sockets layer) certificate. Read More

Microsoft joins list of recently hacked companies
Microsoft has disclosed that it recently fell victim to the same type of cyberattack that targeted Apple and Facebook. Read More

Illinois lawmaker hastily pulls bill that would have stripped online anonymity
An Illinois state senator who introduced a bill that would have required anonymous online posters to reveal their true identities plans to withdraw the bill after taking intense criticism from those who opposed to it. Read More

 

BOOK GIVEAWAY

Enter now for your chance to win! We've got 5 copies of each book to give to some lucky winners.

Ubuntu Unleashed 2013 Edition

Effective JavaScript: 68 Specific Ways to Harness the Power of JavaScript

MOST POPULAR

COBOL will outlive us all

7 frustrating things about being a programmer

The CIA knows when you're hitting the gym

7 days with the Amazon Kindle Fire HD: Revealing its inner power-tablet

The 9 most endangered species in IT

 

Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2013 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.

 

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.