Search This Blog

Thursday, March 05, 2009

Google, Facebook enlisted to help fight online economic stimulus scammers

The fantasy and reality of government security; Security Pros Warm to Web 2.0 Access
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Dell
rule

Virtualization Advisor Tool
This Dell Virtualization Reference Architecture (RA) white paper describes Dell validated architectures for Windows Server 2008(R) Hyper-V. The Virtualization RA is intended to provide customers with example virtualization solution configurations that can be used to consider, evaluate, and select the virtualization solution components that best fit their requirements.

rule

Spotlight Story

Google, Facebook enlisted to help fight online economic stimulus scammers
You knew some chuckleheads somewhere would hop on the economic stimulus plan with a way to scam it online. Indeed the Federal Trade Commission said in a press conference that the problem has quickly become serious. Read more.

Related News:

The fantasy and reality of government security In the movies the government has always got the best toys, the cutting edge technology and the tightest security standards. Those who have worked on security projects within...

Security Pros Warm to Web 2.0 Access Facebook, LinkedIn and Twitter, once viewed as high-risk, productivity-sucking applications, seem to have wiggled their way into the hearts of security teams nationwide. In fact, most organizations no longer block the popular web sites and allow employees to access these Web 2.0 applications at work, according to a new survey from the Security Executive Council.

Mobile browsers bring new security headaches The new generation of mobile Web browsers is going to introduce for enterprise IT departments a rash of security challenges. The good news is that many of those challenges are familiar ones, from desktop browsers.

Reader's Choice picks for the best Windows open source projects Microsoft Subnet blogger Ron Barrett has assembled a collection of readers all time favorite Windows open source tools for security, network management, graphics and more.

Video: DEMO 09: Purewire checks online reputations Purewire's Purewire Trust service lets users check out the online reputation of people, Web sites and things to make sure bad stuff doesn't happen to Web surfers.

Catbird tightens security of virtual machines Catbird is upgrading its virtual security software platform to better track virtual machines as they replicate themselves and to make sure the proper security policies follow them wherever they go.

Certgate unveils encryption SD cards for mobiles Germany company Certgate has released versions of an SD card that encrypt data on Windows Mobile 6.1 smartphones and e-mail on BlackBerry devices.

Security Implications of the Humble Computer Clock Is the clock on every computer system in your organization set to the correct time? If your answer is no, you're not alone. According to a 2007 study by Florian Buchholz and Brett Tjaden, both professors at James Madison University in Virginia, more than a quarter of the Web servers on the Internet have their clocks off by more than 10 seconds. Making sure that computers are set with the correct time is one of those seemingly petty technical things that can unfortunately have big, negative consequences if not done properly. That's because assumptions about time and its flow permeate modern computer systems-including software, hardware and networking. This is true of desktop systems, servers, mobile devices and even embedded systems like HVAC, alarm systems and electronic doorknobs.

Enter for a Microsoft training giveaway from New Horizons
New Horizons Computer Training is offering a free Microsoft training course worth up to $2,500 to be given to one lucky Microsoft Subnet reader. Deadline for entry is March 31.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Best of the Tests 2009
Best of the Tests 2009Out of the more than 150 products tested, a baker's dozen rise to the top of the list.

Fave Raves
2009 Fave RavesSix readers dish on their must-have network products, from desktop systems to wireless access points.

Sponsored by Dell
rule

Virtualization Advisor Tool
This Dell Virtualization Reference Architecture (RA) white paper describes Dell validated architectures for Windows Server 2008(R) Hyper-V. The Virtualization RA is intended to provide customers with example virtualization solution configurations that can be used to consider, evaluate, and select the virtualization solution components that best fit their requirements.

rule

Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies.
Download this Executive Guide now.


Preparing for IPv6.
Get concrete facts on what IPv6 adoption means for your organization in this Executive Guide. Learn how IPv6 and IPv4 can coexist and the role of NAT devices in this new world. Find out if you need to develop a business case today and how to get started.
Download this Executive Guide now.

 

03/05/09

Today's most-read stories:

  1. Helping to keep government's prying eyes at bay
  2. Three nightmares when managing Macs
  3. User sues AT&T over $5,000 Web bill
  4. Linux Foundation taking over Linux.com site
  5. Koobface worm to users: Be my Facebook friend
  6. Back when Google was just a gleam
  7. Sprint comeback: Hard, but doable
  8. iPod ... do you? A playful list of iPods
  9. Resident Evil 5 leaked online, for shame
  10. Apple unveils new Mac mini with Nvidia 9400, FireWire 800
  11. Microsoft TechFest: Commute UX dialog system for in-car infotainment


Network World on Twitter: Get our tweets and stay plugged in to networking news


A Simplified Data Center - Live March 12
Contain costs and improve efficiency and reliability by simplifying your data center architecture. On March 12, data center design and implementation experts share in-depth advice on new approaches and examples of deployments - including price, performance and savings.
Register today for this Live Webcast.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: