Search This Blog

Thursday, January 17, 2008

Identity theft is a burden on the victim

Security Strategies Alert

Network World logo
NetworkWorld.com | Security Research Center | Update Your Profile

SPONSORED BY MESSAGELABS
rule

Executive Guide: A look at data protection
Read this Executive Guide, "Keeping Data Safe and Found," to learn the latest news, analysis, and real-world user advice on protecting corporate data. This comprehensive Executive Guide examines technologies and methodologies, the cost of regulatory compliance and how IT professionals are juggling these issues today. Learn more today. Download this Executive Guide now.

rule

SPOTLIGHT STORY
Identity theft is a burden on the victim

M. E. Kabay By M. E. Kabay
Identity theft is the fastest growing form of fraud today. Criminals use Social Security numbers and other information gleaned from public records to establish lines of credit in the victim's name and then assign their debts to the unsuspecting victim. One of the greatest difficulties is that identity theft reverses the burden of proof to the victim. Read full story

M. E. Kabay, PhD, CISSP-ISSMP is Program Director of the Master of Science in Information Assurance and CTO of the School of Graduate Studies at Norwich University in Northfield, Vt. Mich can be reached by e-mail and his Web site.

RELATED NEWS:

Top Identity Management trends for 2008 David Ting from Imprivata discusses the trends around identity management for 2008.

Bill Gates has no identity, 01/14/08 If you've ever heard Bill Gates speak, you know that he has the vocal charisma of a frog serenade accompanied by chalk on a blackboard. Yet he almost always speaks to standing room only crowds as he did at last week's ...

Cisco warns of Unified Communications Manager heap overflow flaw, 01/16/08 Cisco has released its first new security alert of the year: a warning that its Cisco Unified Communications Manager - formerly CallManager - contains a heap overflow vulnerability in the Certificate Trust List that could allow a hacker to cause a denial-of-service attack or execute arbitrary code.(Plus: Read what the bloggers are saying.)

Ping automates identity federation in new server, 01/15/08 Ping Identity on Tuesday added features to automatically create connections between partners to support single sign-on as part of the next release of its identity federation server.

Nashville laptop theft may cost $1 million, 01/14/08 The theft of a laptop containing Social Security numbers of Nashville, Tenn., area voters is expected to cost local officials about $1 million as they roll out identity-theft protection to those affected.

Congressional report rips U.S. TSA Web site security, 01/11/08 A Web site commissioned by the U.S. Transportation Security Administration (TSA) to help travelers whose names were erroneously listed on airline watch lists originally had multiple security problems that could lead to.../p>

Sears puts customers' buying histories on the Web, 01/04/08 Sears Holdings has come under fire from privacy advocates for making the purchase history of its customers publicly available on its Managemyhome.com Web site.

Firefox hit with spoofing bug, 01/03/08 A serious flaw in how Firefox handles logons could be used by identity thieves to dupe users into disclosing passwords, a noted security researcher said Wednesday.

With trials beginning, another Estonia cyberattack, 01/16/08 With the trial starting for four ethnic Russians charged in connection with rioting last year, the Estonian news site Delfi.ee has weathered a two-week-long denial of service attack.


WORTHWHILE WEB SITES
20 most useful Web sites for IT professionals For both work and pleasure, here are 20 useful sites for IT professionals.

ASK THE MAGIC '08 BALL
CES International 2008 Take a look at the eight hottest technologies for 2008.

SPONSORED BY MESSAGELABS
rule

Executive Guide: A look at data protection
Read this Executive Guide, "Keeping Data Safe and Found," to learn the latest news, analysis, and real-world user advice on protecting corporate data. This comprehensive Executive Guide examines technologies and methodologies, the cost of regulatory compliance and how IT professionals are juggling these issues today. Learn more today. Download this Executive Guide now.

rule

Featured Webcast for Newsletter Subscribers
Improve App Performance with Web Acceleration. Find out how to improve the delivery of Web applications to geographically dispersed users with Web acceleration tools. Learn how to shop for these products and find out what the best and worst applications are. http://www.accelacomm.com/jlp/PSA2_80162151/7/80162151/

Featured reader resource

90% of IT Managers are leaving their company at risk for a DNS ATTACK. Get the tools and resources you need to keep your DNS healthy and secure. Run a DNSreport on your domain today - 56 critical tests run in 8 seconds.

Visit www.dnssfuff.com to learn more. (apply coupon NWW2007NLA for a 25% membership discount)

 

01/17/08

TODAY'S MOST-READ STORIES:

  1. Eight hot technologies for 2008
  2. Sun to acquire MySQL for $1 billion
  3. 20 useful Web sites for IT professionals
  4. Oracle to buy BEA Systems for $8.5 billion
  5. Trojan intercepts online banking information
  6. Young IT workers disillusioned
  7. Microsoft's response to Xbox's wireless signal
  8. How much do big-name CIOs make?
  9. Is Cisco worth the premium?
  10. Workplace reality vs. fantasy for IT pros

FEATURED BUYER'S GUIDE:
Client Management


Executive Guide: A roadmap to compliance

Learn the latest on how to more easily and cost effectively comply with regulations in this informative Executive Guide from your trusted news source Network World. Discover the latest trends in NAC and get an overview on the corporate security threat landscape.

Download this Executive Guide now.



IT Buyers guide

IT Buyer's Guides
Compare products, get advice, and check out tests and reviews from the experts at Network World. Over 70 categories. Visit now.

 


To continue receiving NetworkWorld's Security Strategies Alert newsletter, please add @nwfnews.com to your white list.

COMPLIMENTARY SUBSCRIPTIONS AVAILABLE
As a NW newsletter subscriber you are eligible to receive 50 issues of Network World Magazine, in print or electronic format, free of charge.

Sign up for your subscription today: Apply here. International subscribers,click here.

 

SUBSCRIPTION SERVICES
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Terms of Service/Privacy

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772
Copyright Network World, Inc., 2008

 

 



No comments: