Monday, July 06, 2009

Security guard charged with hacking hospital systems

US sets final emergency responder wireless pilot; Chinese security company shares huge malware database
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile


Sponsored by BigFix
rule

It Power Management Strategies that Save
Successful power management policies deployed at enterprise scale promise numerous benefits including: Power cost savings,Environmental dividends, Rebates, Integration opportunities, Download this whitepaper and discover the building blocks of a successful IT Power Management policy and how this policy can align with your business's green initiatives.

rule

Spotlight Story
Security guard charged with hacking hospital systems

The grainy video shows a bleary-eyed young man in a hoodie inside the Carrell Clinic in Dallas, Texas. As he hits the elevator button, the theme music from Mission Impossible plays in the background. "You're on a mission with me: Infiltration," he tells the camera. Read full story

Related News:

US sets final emergency responder wireless pilot
Looking to help eliminate the dangerous and inefficient hodgepodge of communication and network technology used by emergency response personnel, the US Department of Homeland Security (DHS) today said it had picked 14 groups from across the country to pilot an ambitious Multi-Band Radio project.

Chinese security company shares huge malware database
A Chinese company that has created a massive database of malware found on Chinese Web sites opened up the information to other security organizations on Thursday.

Court orders spammers to pay $3.7 million
A U.S. district court has ordered members of an alleged international spam ring to give up US$3.7 million that they made while sending out illegal e-mail messages pitching bogus weight-loss products and human growth hormone pills.

FTC opens all out assault on economic cyber-scammers
The Federal Trade Commission today announced a wide-ranging attack on cyber-vultures looking to feast on the current moribund economic situation.

The notification chain when a breach is suspected
A few weeks ago, we provided best practice tips on preserving log data for a forensic investigation. Now that you've got the data set aside for your investigation, who else needs to get involved? Let's discuss the notification chain and how other experts support the investigation and its fallout.

July Giveaways
Cisco Subnet is giving away 15 copies each of books on Enterprise Web 2.0 and Building a Greener Data Center; Microsoft Subnet is giving away training from New Horizons to one lucky reader and 15 copies of Microsoft SQL Server 2008 Reporting Services Unleashed. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages. Deadline for entries July 31.

Network World on Twitter? You bet we are


Rise and fall of Nortel
vSphereFor better or worse, Nortel as we know it is coming to an end. Here's how the telecom giant got to this point.

Summer of geeks
IT quizSpace camp! They Might Be Giants! Check out these and 9 other vacation options.

Leveraging Data for Effective IT Management
Create an IT environment that's more secure and easier to manage with IT search. With a holistic view of your IT infrastructure you can easily find and fix problems, follow the trail of a cyber attacker or trace transactions.
Download this report for all of the details.


 

July 06, 2009

TOP STORIES | MOST DUGG STORIES

  1. More porn sneaks onto the iPhone
  2. 'Swatting' case shows need to ban caller-ID spoofing
  3. Why the iPhone can't be "killed"
  4. Nortel enterprise chief wants to bring back Bay
  5. US sets final emergency responder wireless pilot
  6. 11 summer vacation ideas for geeks
  7. Microsoft yanks old patches; smells like FUD
  8. Cisco announces highest certification
  9. Worst U.S. cities to work in IT
  10. Could Cisco take on Microsoft with office apps?

Thinking Beyond Tape: The Case Against Tape Backup
This video whitepaper explores the high cost, complexity and potentially dangerous shortcomings of a strategy based only on tape backup. When recoverability matters, depend on Double-Take Software to dynamically move, protect, and recover your critical applications.
Learn more.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment