Search This Blog

Wednesday, July 08, 2009

Protecting Social Security Numbers online is a futile exercise

Social Security Numbers are predictable, Carnegie Mellon researchers find; Norton Internet Security 2010 beta: Different approach, new features, some glitches
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile


Sponsored by BigFix
rule

It Power Management Strategies that Save
Successful power management policies deployed at enterprise scale promise numerous benefits including: Power cost savings,Environmental dividends, Rebates, Integration opportunities, Download this whitepaper and discover the building blocks of a successful IT Power Management policy and how this policy can align with your business's green initiatives.

rule

Spotlight Story
Protecting Social Security Numbers online is a futile exercise

News today that Social Security Numbers may not be as random nor secure as believed is just one more problem security problem the ubiquitous identification number faces. Read full story

Related News:

Social Security Numbers are predictable, Carnegie Mellon researchers find
Carnegie Mellon University researchers have created an algorithm that can predict Social Security Numbers based on publicly available information from government sources, social networks and other data repositories.

Norton Internet Security 2010 beta: Different approach, new features, some glitches
Symantec's newly released beta of NIS 2010 showcases its new reputation-based approach to malware detection, along with several additional features. However, testers should go carefully -- this is truly beta software.

Microsoft confirms attacks against IE6, IE7
Microsoft today confirmed that hackers are exploiting an unpatched bug in DirectX, this time by attacking Internet Explorer.

Hackers exploit second DirectShow zero-day using thousands of hijacked sites
Thousands of legitimate Web sites hacked over the weekend are launching drive-by attacks using an exploit of a second critical unpatched vulnerability in Windows' DirectShow component, a Danish security company said today.

How to maintain security without increasing the operational load on IT staff
A number of factors are increasing the challenges of keeping networks secure. One source is additional users of varying types -- including some with multiple roles -- coming onto the network. IT staff finds it must support remote workers, guests, contractors, partners, suppliers -- sometimes even competitors -- on the LAN and yet still protect sensitive corporate assets.

July Giveaways
Cisco Subnet is giving away 15 copies each of books on Enterprise Web 2.0 and Building a Greener Data Center; Microsoft Subnet is giving away training from New Horizons to one lucky reader and 15 copies of Microsoft SQL Server 2008 Reporting Services Unleashed. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages. Deadline for entries July 31.

Network World on Twitter? You bet we are


Rise and fall of Nortel
vSphereFor better or worse, Nortel as we know it is coming to an end. Here's how the telecom giant got to this point.

Summer of geeks
IT quizSpace camp! They Might Be Giants! Check out these and 9 other vacation options.

Get the Most from Exchange 2007
Read this whitepaper to discover the changes that have the greatest impact on storage and a reexamination of best practices for designing Exchange storage.
Click here to read more.


 

July 08, 2009

TOP STORIES | MOST DUGG STORIES

  1. The 10 dumbest mistakes network managers make
  2. Rackspace to issue $3.5 million in customer credits
  3. IPhone users harangue Apple over battery life
  4. The tech industry's most baffling buzzwords: A brief guide
  5. Six Windows 7 features admins will actually care about
  6. Internet's biggest issue? IPv6 transition, new ARIN CEO says
  7. Deathmatch: Palm Pre vs. iPhone
  8. Microsoft confirms attacks against IE6, IE7
  9. Apple to add micro projectors to upcoming iPhone, iPod Touch
  10. The sudden departure of Cisco data center marketing honcho

Keep Storage Costs in Check with Tape
The Clipper Group outlines the real costs of migrating to a disk-based storage. You will learn about the dramatic differences between tape-based and disk-based storage in regards to floor space, hardware and energy costs. Find out why tape storage, especially, LTO-4, should be part of your long-term storage plans.
Keep Storage Costs in Check with Tape



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: