SECURITY REPORT
http://www.infoworld.com/
========================================================================
Monday, August 27, 2007
* 10 reasons to be paranoid
* Honeypots as sticky as ever
* Intel's vPro chips in more security for businesses
* German gov't PCs hacked, China offers to investigate
* The Monster.com mess
* Spam fighters hit criminals' weak spot
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -
ADVERTISEMENT
APPLICATION SECURITY: THREATS AND HOW TO COUNTER THEM
Join us for discussion on how to plan and implement a world class
security strategy. In addition, learn about the top trends and
evolution of technology threats as well as how to protect against
the most common threats in application security today. Sponsored
by Fortify Software.
http://newsletter.infoworld.com/t?ctl=19036C2:20920CD98AAF82DDB55F3F409404DBBBEFF29049075316B4
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -
========================================================================
10 REASONS TO BE PARANOID
The truth is out there ... and so is your data. And just because there
are no virtual black helicopters following you doesn't mean somebody
somewhere doesn't have a bead on who you are and what you are doing.
http://newsletter.infoworld.com/t?ctl=19036BA:20920CD98AAF82DDB55F3F409404DBBBEFF29049075316B4
========================================================================
HONEYPOTS AS STICKY AS EVER
Longtime readers of my column know what a honeypot proponent I am. I run
several around the world, collecting information on malware and
malicious hackers, and I think every company should have one.
http://newsletter.infoworld.com/t?ctl=19036BD:20920CD98AAF82DDB55F3F409404DBBBEFF29049075316B4
========================================================================
INTEL'S VPRO CHIPS IN MORE SECURITY FOR BUSINESSES
With the introduction of its latest vPro microprocessors on Monday, Intel
contends it is injecting a heavy dose of new security capabilities for
the benefit of business customers and third-party technology providers
alike.
http://newsletter.infoworld.com/t?ctl=19036B8:20920CD98AAF82DDB55F3F409404DBBBEFF29049075316B4
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -
ADVERTISEMENT
APPLICATION SECURITY: THREATS AND HOW TO COUNTER THEM
Join us for discussion on how to plan and implement a world class
security strategy. In addition, learn about the top trends and
evolution of technology threats as well as how to protect against
the most common threats in application security today. Sponsored
by Fortify Software.
http://newsletter.infoworld.com/t?ctl=19036C2:20920CD98AAF82DDB55F3F409404DBBBEFF29049075316B4
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -
========================================================================
GERMAN GOV'T PCS HACKED, CHINA OFFERS TO INVESTIGATE
Chinese premier Wen Jiabao described reports of Chinese hackers breaking
into German computers as a matter of "grave concern" and said
Monday that his country will cooperate with Germany to resolve the
matter.
http://newsletter.infoworld.com/t?ctl=19036C8:20920CD98AAF82DDB55F3F409404DBBBEFF29049075316B4't-PCs-hacked-China-offers-to-investigate_1.html?source=NLC-SEC&cgd=2007-08-27
========================================================================
THE MONSTER.COM MESS
The last thing you need when you're unemployed is a bank account that's
suddenly emptied. But that's exactly what some unwary users of
employment search site Monster.com faced after identity thieves made off
with the personal information of more than a million people looking for
jobs.
http://newsletter.infoworld.com/t?ctl=19036BC:20920CD98AAF82DDB55F3F409404DBBBEFF29049075316B4
========================================================================
SPAM FIGHTERS HIT CRIMINALS' WEAK SPOT
Is the fight against spam horribly misguided?
http://newsletter.infoworld.com/t?ctl=19036B9:20920CD98AAF82DDB55F3F409404DBBBEFF29049075316B4
======================================================================
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -
ADVERTISEMENT
APPLICATION SECURITY: THREATS AND HOW TO COUNTER THEM
Join us for discussion on how to plan and implement a world class
security strategy. In addition, learn about the top trends and
evolution of technology threats as well as how to protect against
the most common threats in application security today. Sponsored
by Fortify Software.
http://newsletter.infoworld.com/t?ctl=19036C2:20920CD98AAF82DDB55F3F409404DBBBEFF29049075316B4
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -
DAILY NEWS, DELIVERED TO YOUR COMPUTER, MP3 PLAYER OR CELL PHONE
The InfoWorld Daily podcast provides readers with
up-to-the-minute news and features that shape the world
of enterprise IT. Tom Sullivan reports on the leading news
and events that shape the today's IT community.
http://newsletter.infoworld.com/t?ctl=19036BE:20920CD98AAF82DDB55F3F409404DBBBEFF29049075316B4
======================================================================
ADVERTISE
To advertise, contact Kate_Hobbie@infoworld.com.
======================================================================
UNSUBSCRIBE/MANAGE NEWSLETTERS
To subscribe, unsubscribe or change your e-mail address for any of
InfoWorld's e-mail newsletters, go to:
http://newsletter.infoworld.com/t?ctl=19036BF:20920CD98AAF82DDB55F3F409404DBBBEFF29049075316B4
Contact Customer Service at: customerservice@infoworld.com
To view InfoWorld's privacy policy, visit:
http://newsletter.infoworld.com/t?ctl=19036C0:20920CD98AAF82DDB55F3F409404DBBBEFF29049075316B4
Copyright (C) 2007 InfoWorld Media Group.
501 Second St., San Francisco, CA 94107
This message was sent to: security.world@gmail.com
No comments:
Post a Comment