Tuesday 31 January 2012

[TechRepublic] What can be done about apps gone rogue?

IT Security

TechRepublic Member | January 31, 2012

Repurposed software: Apps gone rogue

You come up with a dynamite app. Companies are thrilled with it. Next thing you know, your app is used to deny visitors access to a website. Michael Kassner considers repurposed software. Read more

Resource of the day

Implementing energy-efficient data centers

The cost of powering data centers is a substantial operating expense that can and should be managed. This white paper explains how to design data centers in a way that minimizes their electrical power consumption. (APC)


World IPv6 launch day set: Security pitfalls to look out for

Patrick Lambert warns that when the IPv6 launch date officially arrives this June 6, it will be prudent to watch out for some security gaps in the initial days. Here are some issues to think about. Read more

Insidious insiders: Psychology provides clues in handling invisible threats

Dominic Vogel considers the insider threat risk in organizations and suggests that cross-departmental collaboration could help shore up data loss prevention methods. Read more

Symantec says to disable pcAnywhere after source code exposure by Anonymous

Symantec acknowledges a breach that exposed the source code for pcAnywhere. Users are advised to disable it immediately until software updates are available to resolve vulnerabilities. Read more

Additional TechRepublic resources

 

One policy, one Google experience, even more declarations of evil

As soon as you connect a device to the Internet, you are tracked, cataloged, and targeted with "appropriate" advertising. Is that really evil? Read more

Stop deceptive phishing emails with DMARC.org standards

Dealing with the aftereffects of a phishing attack can be more than a little frustrating. One group is trying to fix that with a set of standards. Read more

New Asus Transformer Prime comes complete with previous owner's personal info

Always wipe gadgets before returning them. Bill Detwiler shares a cautionary tale and steps for wiping iOS, Android, and Windows Phone 7 devices. Read more

An argument against the new secure boot feature in Windows 8

Donovan Colbert argues that settling for mandatory, walled gardens is giving away the liberty to use your hardware as you see fit. Read more

Featured multimedia

 

How to passcode lock Wi-Fi on Kindle Fire (photos)

Learn how to disable the Wi-Fi connection on an Amazon Kindle Fire tablet, preventing the possibility of having your credit card charged or exposing children to objectionable content. View on site


Featured Webcast

Live Webcast: Fast and Efficient Business Security Strategies

Check out this webcast to learn more about fast and efficient business security strategies. You're in the midst of an arms race, make sure you win it.


Today's recommended downloads

Power and Cooling Capacity Management for Data Centers (American Power Conversion (APC))

Security in Cloud Computing (Intel Corporation)

Intel Trusted Compute Pools Video (Intel Corporation)

Stop Taking the Heat - Six Steps to Avoid the e-Discovery Inferno (Quest Software)

IT Managers Speak Out about Cloud Security (Intel Corporation)


Connect with TechRepublic

TechRepublic Facebook Fan Page

Follow TechRepublic on Twitter

30 knock-out photography websites

Web designer Ryan Boudreaux makes 30 picks for some of the most inspirational photography-oriented websites.



TechRepublic newsletters

 

Get product reviews, tech news analysis, tips, and more in the following TechRepublic newsletters. Automatically sign up today!

TechRepublic Australia Wrapper

Web Designer

The Enterprise Cloud

Tablets in the Enterprise

Google in the Enterprise

App Builder

10 Things




Send us your feedback here.

Sign up for more free newsletters from TechRepublic!
To manage your account settings or to remove yourself from all TechRepublic communications, please visit our Subscription Center.

The e-mail address for your subscription is habib2best@gmail.com.
Unsubscribe from this e-mail | FAQ | Advertise | Privacy Policy

Tr Footer Logo

Copyright 2012 CBS Interactive, Inc. All rights reserved.
TechRepublic is a registered service mark of CBS Interactive, Inc.

TechRepublic
235 Second Street
San Francisco, CA 94105
U.S.A.

No comments:

Post a Comment