Search This Blog

Friday, August 14, 2009

Android security chief: Mobile-phone attacks coming; Killer asteroids getting free pass on NASA's watch

Killer asteroids getting free pass on NASA's watch; China will not enforce Green Dam porn filter plan
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile


Sponsored by Qualys
rule

Security Road Map: Best Practices, Tools
Discover how to recover from a data breach, gain compliance while saving money, and much more in this road map for regulatory compliance, breach avoidance and all-around solid security. Also learn the latest trends in network access control devices and data-leakage protection tools.

Click here to learn more.

rule

Spotlight Story
Android security chief: Mobile-phone attacks coming

As smartphones become more popular, they're going to get some unwanted attention from criminals, Google's head of Android security said Wednesday. Read full story

Related News:

Killer asteroids getting free pass on NASA's watch
NASA seems hamstrung on this one. Tasked with watching out for huge chunks of space rocks that could smash into the earth, it has been denied the money to actually do the job.

China will not enforce Green Dam porn filter plan
China said Thursday it will not force PC makers to bundle an Internet filtering program with computers sold in the country, backing down from a plan that stirred global controversy.

ICANN says new policy has killed 'domain tasting'
The entity in charge of the Internet's addressing system is declaring victory over an abusive trend in registering domain names.

Palm Pre debacle highlights location privacy issues
Reports about Palm keeping track of Pre users have shown how location services can backfire, and the importance of making users aware of how information is used.

Government DNA database plans slammed again
Government plans to hold for 12 years the DNA data of people not found guilty of any crimes break human rights laws.

RFID: Passport to Insecurity
While we're on the theme of governmental incompetence, I saw this piece on the fundamental insecurity of the passive RFID chips now being embedded in US (and a few other) passports. While I don't think most of us have much to worry about in terms of personal physical security while abroad (being kidnapped in the south of France but technologically-sophisticated terrorists?

August Giveaways
Cisco Subnet is giving away training from Global Knowledge and 15 copies of Practical Intrusion Analysis; Microsoft Subnet is giving away training from Global Knowledge and 15 copies of SCCM 2007 Unleashed. Google Subnet is giving away 15 copies of Web Geek's Guide to Google Chrome. Entry forms can be found on the Cisco Subnet, Microsoft Subnet and Google Subnet home pages. Deadline for entries is August 31.

Network World on Twitter? You bet we are


Cool BlackBerry games
Black HatBlackBerries are known for e-mail, but they are also getting better at mobile games. Here are 10 of the best.

Google facts
IT quizTake this quiz to see how well you know the company – and no fair googling the answers.

IDC: Realizing the Benefits of Deduplication
Many organizations are grappling with rapidly growing storage requirements. IDC has found that those organizations are experiencing 50% growth in data, adding as much as 4TB of data each year.
Learn more.


Red Hat Enterprise Linux on IBM System z: Virtualization that Drives Cost Savings
IBM and Red Hat together offer a world-class platform for virtualization that allows you to do more with less, dramatically shift your IT cost structure, and manage the growth and increasing complexity of your business.
Learn More

 

August 14, 2009

TOP STORIES | MOST DUGG STORIES

  1. Should your credit report disqualify you for a job?
  2. Top 10 must-have iPhone business apps
  3. How famous OS logos got started
  4. 10 worst video game systems of all time
  5. Why Microsoft is sabotaging desktop virtualization
  6. Do HP, 3Com value claims trump Cisco?
  7. Who says the router can't be sexy?
  8. Microsoft, Apple, Mozilla patches
  9. Patch Tuesday: What the experts are saying
  10. Windows 7: How low can you go?

Realize Significant Storage Cost Savings with Automation
Dramatically increase storage utilization with a system that automates storage capacity management. Benefits include: Identifying and redirecting dark storage, allowing data to grow into existing storage safely, the ability to reclaim over-provisioned storage, a fast return on investment. Don't let storage unnecessarily drain your IT budget.
Read More



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: