Thursday, February 19, 2009

3 Ways Twitter Security Falls Short; CVS spanked; Hackers break into gov't travel site

Facebook's Privacy Flap: What Went Down, What's Next; ATM hack: Organized crime or market forces?
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Brocade
rule

Connect, Merge & Manage your IT Resources
The Brocade Fibre Channel HBAs represent a new class of server connectivity product that is interoperable with the vast majority of the world's SAN switch ports and that can leverage Brocade Advanced Fabric Services functionality. As a result, these HBAs provide high-performance, reliable, enterprise-class server connectivity.

rule

Spotlight Story
3 Ways Twitter Security Falls Short

By Joan Goodchild
The popular micro-blogging platform Twitter continues its explosive growth. Twitter experienced a 900 percent increase in active users in the last year, according to a recent blog post from Biz Stone, the company's co-founder. People are increasingly using it to get breaking news updates, to collaborate with colleagues remotely, and connect with friends on an up-to-the-minute basis. Some businesses are using it as a new promotion and marketing tool. Read full story

Related News:

CVS spanked for customer privacy failures, pays $2.25 million to settle HIPAA violations The largest pharmacy chain in the U.S., CVS Caremark, today settled Federal Trade Commission charges it failed "to take reasonable and appropriate security measures to protect the sensitive financial and medical information of its customers and employees," in violation of federal law.

Hackers break into gov't travel site, feed users attack code A travel reservations Web site used by several federal agencies was hacked last week, and shunted unsuspecting users to a malicious domain, according to information Computerworld has obtained.

Security Vendor Breaches: Fallout Justified Attendees at last week's ShmooCon security conference were transfixed when news broke that a hacker breached part of Kaspersky Lab's U.S. support site by exploiting a flaw in the site's programming.

Hackers steal thousands of Wyndham credit card numbers Hackers broke into a computer at Wyndham Hotels and Resorts last July and stole tens of thousands of customer credit card numbers, the hotel chain warns.

Facebook's Privacy Flap: What Went Down, What's Next Facebook may have done an about-face with its policies on using user data, but the social network's struggle to balance business with privacy is far from over.

ATM hack: Organized crime or market forces? In November of 2008, a single scam netted more than $9m in a global automated teller machine heist. According to the FBI the attackers compromised pre-paid payroll cards from RBS WorldPay and gift cards, launching a coordinated attack against more than 130 ATMs in 49 cities around the world. The cards were exploited by "cashers" who withdrew money during a single 30-minute window. If the preliminary findings of the FBI turn out to be true, this could represent one of the most organized attacks in cybercrime history.

Accused rogue admin Terry Childs makes his case He's been in jail for seven months now, but former San Francisco network administrator Terry Childs says he's going to keep fighting to prove he's innocent of computer crime charges.

Hackers jump on newest IE7 bug Attackers are already exploiting a bug in Internet Explorer 7 (IE7) that Microsoft Corp. patched just last week, security researchers warned Tuesday.

Sun offers open-source encryption key management protocol Sun announced today that it is throwing its hat into the standards arena, proposing that its open-source key management API be used as a universal way to allow encrypting devices to communicate with key management systems.

Symantec to release Endpoint Virtualization Suite this spring Symantec Tuesday unveiled Endpoint Virtualization Suite, its set of server-based tools for controlling and delivering laptop and desktop application environments through flexible online provisioning.

Trustwave buys NAC vendor Mirage Managed security provider Trustwave has bought up independent NAC vendor Mirage Networks and will add NAC to the list of services Trustwave provides.

February giveaways from Cisco Subnet and Microsoft Subnet
Up for grabs: One American Express gift card worth $250 from Global Knowledge; One Microsoft training course worth $2,995 from Global Knowledge; 15 copies each of the hot book titles Voice over IP Security, and CCNA Wireless Official Exam Certification Guide and 15 copies of Exchange Server 2007 How-To: Real Solutions for Exchange Server 2007 SP1 Administrators. Get all the entry details here.


IT & social networks
where IT pros do their social networkingSurvey takes a look at where IT pros do their social networking.

Hot spot safety tips
Top 10 hot spot safety tipsHow to protect laptop data at your local Wi-Fi hot spot.

Sponsored by Brocade
rule

Connect, Merge & Manage your IT Resources
The Brocade Fibre Channel HBAs represent a new class of server connectivity product that is interoperable with the vast majority of the world's SAN switch ports and that can leverage Brocade Advanced Fabric Services functionality. As a result, these HBAs provide high-performance, reliable, enterprise-class server connectivity.

rule

Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies.
Download this Executive Guide now.


Everybody says "Do more with less!"
But no one tells you how. We will and it costs nothing to find out at IT Roadmap Conference and Expo. Coming to 10 cities in 09 including New York in February, Denver in March, Chicago in April.
Register now, attend free

 

02/19/09

Today's most-read stories:

  1. Nortel exec issues vague promise to detail its reorganization
  2. 9 dirty tricks: Social engineers' favorite pick-up lines
  3. Social network sites vary greatly on availability
  4. SolarWinds offers free Cisco IP SLA monitoring tool
  5. Vodafone to sell second HTC Google phone
  6. How to build your own supercomputer
  7. Spammers break Hotmail's CAPTCHA yet again
  8. Microsoft strives for mobile mindshare with Windows Mobile 6.5
  9. Is Cisco short of cash in the U.S.?
  10. LiMo's Linux-based mobile OS stack makes gains


Compare Security Information Management Products
Get side-by-side product comparisons, buying tips, market trend information, case studies and more with Network World's newly enhanced Security Information Management Product Guide.
Visit now



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment