| Adobe issues critical security updates for Flash Player, Reader and Shockwave Player | Obvious? Not so much: TSA reminds you not to travel with hand grenades | |||||||||
| Network World Security | |||||||||
| Patch Tuesday: Fixes 4 critical flaws, 8 remote code execution vulnerabilities RESOURCE COMPLIMENTS OF: Network World Tech Tours SDN and Network Virtualization event in Philly and Wash. DC Attend and learn how SDN works, its potential in the enterprise, and why leading, bellwether organizations are leveraging it for data center and large-scale networking efficiency- Learn more and register in a city most convenient for you. 9/17- Philly; 10/8- Wash. DC Click to continue In this Issue
WEBCAST: IBM Fighting Fraud Videos: IBM Intelligent Investigation Manager Short videos about IBM Intelligent Investigation Manager (IIM) for Fraud. IIM optimizes the investigation of fraud for customers across many industries in both the commercial and public sector space. Learn More. Adobe issues critical security updates for Flash Player, Reader and Shockwave Player Obvious? Not so much: TSA reminds you not to travel with hand grenades WHITE PAPER: SolarWinds 2013 Network Management Software Buyer's Guide Network management solutions can range from free, open‐source tools, to complex & pricey enterprise class solutions. Balancing the trade‐offs between price & features can be tough. To help with this challenge, Networkmanagementsoftware.com reviewed six different solutions. Learn More Gartner: Be wary of nascent managed mobility services The iPhone 5s fingerprint reader: what you need to know WHITE PAPER: F5 Networks 5 Ways to Improve XenApp 6.5 If you are planning to migrate to XenApp 6.5 or improve upon XenDesktop then performance, security, and reliability are concerns for success. Citrix recommends that you use an ADC to address these concerns. Learn More Buggy Microsoft update hamstrings Outlook 2013 Reported NSA actions raise serious questions about tech industry partnerships New browser blocks snooping adware, Google tracking Encryption still best way to protect data -- despite NSA | |||||||||
SLIDESHOWS 10 Sorriest Technology Companies of 2013 Microsoft, Apple and Samsung among those issuing mea culpas. JOIN THE NETWORK WORLD COMMUNITIES As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). MOST-READ STORIES 1. First look: Apple iPhone 5S and iPhone 5C 2. What online news looked like on 9/11 3. Apple stuns with 64-bit iPhone 5S; unveils lower-priced 5C 4. 15 geeky places to visit before you die 5. Cisco takes aim at security services with new division 6. 10 hard-earned lessons of a lifetime in IT 7. Fatal distraction: 7 IT mistakes that will get you fired 8. 15 most powerful Big Data companies 9. How Microsoft's Surface 2 and Surface Pro 2 are better suited for businesses 10. 10 amazing Linux desktop environments you've probably never seen | |||||||||
| Do You Tweet? You are currently subscribed to networkworld_security_alert as buzzhairs@gmail.com. Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy To contact Network World, please send an e-mail to customer_service@nww.com. Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701 ** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. ** | |||||||||
Thursday, 12 September 2013
Patch Tuesday: Fixes 4 critical flaws, 8 remote code execution vulnerabilities
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment