Search This Blog

Friday, July 10, 2009

How to use electrical outlets and cheap lasers to steal data

IBM researchers build security software to mask confidential info; Google's OS security claims called 'idiotic'
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile


Sponsored by WatchGuard
rule

Protecting Your Network from Home Wireless Hackers
IT managers must train their end users on wireless security, specifying wireless router hardware and configuration settings, and in some cases, providing firewall/VPN endpoint appliances for key employees' in-home use. Read more to discover the eight essential tips for nailing down security for off-site wireless users. Share it with your remote users today to help them work from home safely.

rule

Spotlight Story
How to use electrical outlets and cheap lasers to steal data

Read full story

Related News:

IBM researchers build security software to mask confidential info
Researchers at IBM have developed software that uses optical character recognition and screen scraping to identify and cover up confidential data. According to IBM the driving idea behind the MAGEN (Masking Gateway for Enterprises) system is to prevent data leakage and allow the sharing of data while safeguarding sensitive business data.

Google's OS security claims called 'idiotic'
Google, while announcing its new Chrome operating system late Tuesday, said users would no longer have to worry about viruses, malware and security updates, but security experts disagreed on whether Google can deliver on those promises.

The cost of not reaching IT project closure
All things, good and bad, eventually come to an end. Philosophers have told us this in many variations for at least three or four thousand years. In IT we seem to have exquisitely intricate plans for starting new things: projects, applications, users, policies. Yet we seem to always forget to plan for their eventual end: the closure of projects, the removal of applications, the retirement of servers and the departure of users. Why do we find it so hard to achieve closure?

Firms face security pressure from Web 2.0, survey says
Companies around Hong Kong and China are facing security pressures coming from their own employees trying to bypass company security policies for new Web applications, a survey commissioned by IT solutions providers Websense said.

US authorities extradite Indian on hacking charges
An Indian man has pleaded not guilty to charges that he hacked into online brokerage accounts in order to manipulate stock prices.

July Giveaways
Cisco Subnet is giving away 15 copies each of books on Enterprise Web 2.0 and Building a Greener Data Center; Microsoft Subnet is giving away training from New Horizons to one lucky reader and 15 copies of Microsoft SQL Server 2008 Reporting Services Unleashed. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages. Deadline for entries July 31.

Network World on Twitter? You bet we are


Rise and fall of Nortel
vSphereFor better or worse, Nortel as we know it is coming to an end. Here's how the telecom giant got to this point.

Summer of geeks
IT quizSpace camp! They Might Be Giants! Check out these and 9 other vacation options.

It Power Management Strategies that Save
Successful power management policies deployed at enterprise scale promise numerous benefits including: Power cost savings,Environmental dividends, Rebates, Integration opportunities, Download this whitepaper and discover the building blocks of a successful IT Power Management policy and how this policy can align with your business's green initiatives.
It Power Management Strategies that Save


 

July 10, 2009

TOP STORIES | MOST DUGG STORIES

  1. Imagine the Googlemobile
  2. The 10 dumbest mistakes network managers make
  3. Microsoft may have known about critical IE bug for months
  4. 4chan hell raisers finding fame brings heat?
  5. Gmail, other Google apps, out of beta
  6. Windows 7 ramp-up will be sharp
  7. Yahoo invents 'chicken coop' data centre design
  8. The sudden departure of Cisco data center marketing honcho
  9. Online attack hits U.S. government Web sites
  10. Internet's biggest issue? IPv6 transition, new ARIN CEO says

The Business Case for Server Virtualization
Can an investment in new servers really save money? Yes, in fact their increased performance, lower energy costs and ability to optimize virtualization can reduce annual energy costs by 92% and provide payback in as little as 3 months. Learn the reasons to consider a server refresh.
Read More



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: