Search This Blog

Tuesday, April 28, 2009

The new ground zero in Internet warfare; Spammers seize on swine flu to pitch bogus meds

How scared should you be about security statistics?; How can you handle risks that come with social networking?
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Symantec Corporation
rule

Symantec Corporation Maximize business protection, with ease
Symantec Protection Suite reduces the cost of securing your environment and helps you more effectively mange the risk inherent in today's IT infrastructures. In this 60 minute webcast, you will learn how Symantec Protection Suite Enterprise Edition offers comprehensive protection all in one easy-to-deploy suite. Webcast: Tuesday, May 5, 2009 at 9am PDT / 12pm EDT.

rule

Spotlight Story

The new ground zero in Internet warfare
When it comes to critical national infrastructure, the highly distributed and ultra-interconnected U.S. power grid is, hands down, the most vulnerable to cyberattack. On this one point, many cybersecurity experts seem to agree.
Internet warfare: Is the focus on the wrong things?
The fog of (cyber) war
Could a cyber blockade happen to the U.S.?
Software: The eternal battlefield in the unending cyberwars

Related News:

Editor's note: We will be changing how we send out Network World newsletters over the next few weeks. To ensure future delivery of your newsletters, please add nww_newsletters@newsletters.networkworld.com to your e-mail address book or
66.186.127.216 to your white-list file. Thank you.

Spammers seize on swine flu to pitch bogus meds Spammers have seized on the growing interest in news of a possible swine flu epidemic to hawk fake pharmaceuticals, security experts warned Monday.

Is the Internet Ready for a Pandemic? As the dreaded word "pandemic" tops this week's headlines about the swine flu virus spreading around the globe, many businesses are dusting off emergency plans for employees to work from home and schools are poised to send students home. If this turns out to be a full-fledged pandemic, not only will people fall ill, the Internet will too.

Portrait of a Security-Savvy User The Depository Trust & Clearing Corp. takes information security seriously.

Cloud computing security: Who knew? Cloud computing is big even though there is less than perfect agreement on just what it is. As a measure of success, Google gets more than 25 million hits for the term "cloud computing". If you add "security" to the search you still get 20 million hits, but a lot of the hits turn out to be articles focusing on the security issues with cloud computing.

eBay, Xerox fraudster welcomed to federal prison This guy was a one man Internet fraud machine. Not only did he sell cars on eBAy and AutoTrader.com that he didn’t actually own but then tried to defraud folks via a Xerox copier scam. But today the system caught up with him as a judge sentenced Derrick Swantz to a little over four years in a federal prison plus an addition three years of supervised parole on charges of mail and wire fraud.

Ex-federal IT worker charged in alleged ID theft scam A former IT analyst at the Federal Reserve Bank of New York and his brother were arrested Friday on charges that they took out loans using stolen information, including sensitive information belonging to federal employees at the bank.

Seven burning security questions There's no shortage of burning questions about IT security these days, some sparked by nasty threats, others by economic concerns and some by growing use of social networking and cloud computing.
Read more:
Can you no longer avoid closely monitoring employees?
Should you choose a strategic security vendor or shoot for best-in-breed?
Can security processes finally be automated?
How scared should you be about security statistics?
Are security issues delaying adoption of cloud computing?
Is mobile computing the Achilles' heel in your organization?
How can you handle risks that come with social networking?

IPv6 summit reaches pinnacle Cisco Subnet blogger Scott Hogg says there was plenty of helpful background information and protocol details on hand during the Rocky Mountain IPv6 Summit in Denver.

Prevent intrusions: What to look for In the Buying Tips section of our Product Guide, find 15 questions to ask about IPS before you buy one.

April giveaways galore
Cisco Subnet
and Microsoft Subnet are giving away training courses from Global Knowledge, valued at $2,995 and $3,495, and have copies of three hot books up for grabs: CCVP CIPT2 Quick Reference by Anthony Sequeira, Microsoft Voice Unified Communications by Joe Schurman and Microsoft Office 2007 On Demand by Steve Johnson. Deadline for entries April 30.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Evolution of Ethernet
Evolution of Ethernet From 3Mbps over shared coax to 40/100Gbps over fiber…and beyond.

Apple iPhoneys: The 4G edition
Apple iPhoneys: The 4G editioniPhone enthusiasts from around the Web offer their visions for the next-gen iPhone.

Sponsored by Symantec Corporation
rule

Symantec Corporation Maximize business protection, with ease
Symantec Protection Suite reduces the cost of securing your environment and helps you more effectively mange the risk inherent in today's IT infrastructures. In this 60 minute webcast, you will learn how Symantec Protection Suite Enterprise Edition offers comprehensive protection all in one easy-to-deploy suite. Webcast: Tuesday, May 5, 2009 at 9am PDT / 12pm EDT.

rule

Cut Campus Network TCO by 50%.
Learn how to reduce your campus networks' TCO by up to 50% without compromising high performance, security or reliability. Juniper Networks shows you how to achieve unparalleled consistency, flexibility and efficiency for the lowest possible TCO.
Click here to register for this Live April 30 Webcast.


Metzler: 2009 Handbook of Application Delivery
Successful IT organizations must know how to make the right application delivery decisions in these tough economic times. This handbook authored by WAN expert Jim Metzler will help guide you.
Download now

 

04/28/09

Today's most-read stories:

  1. Some IT skills see pay hikes during downturn
  2. Seven burning security questions
  3. The downfall of Sun
  4. The legal risks of ethical hacking
  5. Conficker.E to self-destruct on May 5th?
  6. Researchers show how to take control of Windows 7
  7. Einstein systems to inspect U.S. government's Internet traffic
  8. The evolution of Ethernet
  9. The biggest losers in the Oracle, Sun deal
  10. Intel CPU cache poisoning: dangerously easy on Linux
  11. Notebook replaces trackpad with LCD panel


Network World on Twitter: Get our tweets and stay plugged in to networking news


EMA: Refining privilege access security.
Close the security gaps in high-privilege access control and authentication by selecting the right security products for the job. This whitepaper, "Resolving the Privilege Management Paradox," details how. EMA outlines how to find products that offer strong shared access management, better control and clear visibility and multifactor authentication.
Click to download.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: