Expert: Hackers penetrating control systems The networks powering industrial control systems have been breached more than 125 times in the past decade, with one resulting in U.S. deaths, a control systems expert said Thursday. Chinese high-tech spy case inches closer to trial Did software engineer Hanjuan Jin, who worked at Motorola for about eight years, steal thousands of confidential and proprietary technical documents to share with competitor Lemko and the People’s Republic of China? Brits stuff mobiles with risky ID data The data stored by Brits on their personal mobile phones can be easily used for ID theft purposes, especially because of the minimal security measures they take to guard the data, warned Credant Technologies. Online organ donor broker charged with wire fraud The operator of Liver4you.org is facing wire fraud charges for an alleged scheme to use the Web site to entice people needing organ transplants to wire tens of thousands of dollars to the Philippines in exchange for nonexistent surgeries, the U.S. Department of Justice said. What it will take for mobile VoIP to get enterprise-ready Mobile VoIP technology has yet to evolve to the point where users can simply switch on their phones anywhere and expect to connect to a secure IP network. Here's what it will take for that to have a chance of happening. Protect Your Data With Whole-Disk Encryption In my last post, I talked about some of the tools that claim to recover your stolen laptop. This time I want to review another series of tools that can be useful protection as well: doing whole-disk encryption of your hard drives across your enterprise. The idea that even if your laptop falls into the wrong hands, no one besides yourself will be able to read any of the files stored on it. When you boot your PC, you need to enter a password, otherwise the data in each file is scrambled, and no one else can gain access to your files. Australia's Web blacklist leaked The secretive Internet filter blacklist held by the communications watchdog ACMA has been leaked, revealing the government has understated the amount of banned Web pages by more than 1,000. Security management: 3 key considerations What should you ask when buying security information management software? Enter for a Microsoft training giveaway from New Horizons New Horizons Computer Training is offering a free Microsoft training course worth up to $2,500 to be given to one lucky Microsoft Subnet reader. Deadline for entry is March 31. Network World on Twitter Get our tweets and stay plugged in to networking news. |
No comments:
Post a Comment