Bluetooth is not a dental condition Computer scientists Karen Scarfone of the Computer Security Division of the Information Technology Laboratory at the NIST has collaborated with John Padgette, an associate at Booz Allen Hamilton to write a new Special Publication entitled "Guide to Bluetooth Security," which summarizes the security issues and provides recommendations for protecting sensitive information carried via these wireless systems. Cell phone security Computer scientists Wayne Jansen and Karen Scarfone of the Computer Security Division of the Information Technology Laboratory at the National Institute of Standards and Technology (NIST) have written a new (October 2008) Special Publication entitled "Guidelines on Cell Phone and PDA Security," which summarizes the security issues and provides recommendations for protecting sensitive information carried on these devices. Tech crime blotter: February's top 15 stories A look back at the month's biggest technology stories involving alleged and actual crimes, including Microsoft putting a bounty on the head of the Conficker worm authors and the FBI warning about "swatting." Controlling unauthorized application usage without increasing costs "Our IT department has identified a potential issue with shared account usage in our applications. Can we control unauthorized usage or will we need to replace the apps? We want to avoid that cost if at all possible." Downadup worm may hammer Southwest Airlines URL March 13 Computers infected by the Downadup worm will "phone home" to several legitimate URLs this month, including one owned by Southwest Airlines , potentially disrupting those sites, a security researcher said Sunday. Exposed Web site a reminder for use of multiple passwords A Christian singles Web site called Singles.org was infiltrated by hackers last weekend, reportedly absconding with the secret passwords of over 9,000 of its users. 5 Facebook Scams: Protect Your Profile Beny Rubinstein knows computer security. An employee of a Seattle-area tech giant with 20 years of IT experience under his belt, Rubinstein has seen a side of the industry that most people will never know. He holds a degree in computer engineering, and - oh yeah - he just got scammed out of $1100 on Facebook. Hope for a New Cybersecurity Administration Politically, it seems to be a time to be full of hope. Despite the slumping economy and the challenges that lie before us, hope takes on two forms for me this year: Enter for a Microsoft training giveaway from New Horizons New Horizons Computer Training is offering a free Microsoft training course worth up to $2,500 to be given to one lucky Microsoft Subnet reader. Network World on Twitter Get our tweets and stay plugged in to networking news. |
No comments:
Post a Comment