Search This Blog

Thursday, August 13, 2009

Should your credit report disqualify you for a job?; Microsoft, Apple, Mozilla patches put heavy load on IT

Microsoft, Apple, Mozilla patches put heavy load on IT; Apple patches 6 Safari security vulnerabilities
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile


Sponsored by Tripwire
rule

7 Barriers to a Known and Trusted State
Discover the most common obstacles to achieving a known and trusted state, as well as how automated configuration assessment tools can overcome them. Ease the burden of achieving and maintaining compliance, securing your infrastructure and generating evidence for audits.

rule

Spotlight Story
Should your credit report disqualify you for a job?

Two companies that fired workers and rejected job applicants based on background checks without informing those people of their rights have settled with the Federal Trade Commission for $77,000 in civil penalties. Read full story

Related News:

Microsoft, Apple, Mozilla patches put heavy load on IT
Windows took it on the chin Tuesday as Microsoft released nine patches, five labeled critical, as part of its Patch Tuesday monthly release cycle.

Apple patches 6 Safari security vulnerabilities
A month after it last patched Safari, Apple today plugged six security holes, four of them critical, in both the Mac and Windows versions of its Web browser.

Cloud computing, compliance raise questions
I'll continue today with some miscellaneous notes, announcements and conversations that happened in the run up to the recent Catalyst Conference that I started in the last issue.

Phone calls & emails snooped on 500,000 times
The UK government has been accused of supporting a surveillance society akin to George Orwell's 1984 after new figures revealed that police, councils and intelligence services made more than 500,000 requests to access citizens' communications data in 2008.

No, you're not infected
A reader who wishes to remain anonymous is concerned about a very scary looking website. I attempt to calm the waters.

Potential gov't cookie policy change prompts concerns
A potential change in the U.S. government's policy that would permit the broad use of Web cookies on government sites could "allow the mass collection of personal information," according to the American Civil Liberties Union (ACLU).

The Hidden Cost of Out-of-Cycle Security Patches
This week we all had to deal with the emergency Microsoft security patches due to a critical exposure in the Active Template Library (templates used for COM+ development) that could result in local code execution by a hacker.

August Giveaways
Cisco Subnet is giving away training from Global Knowledge and 15 copies of Practical Intrusion Analysis; Microsoft Subnet is giving away training from Global Knowledge and 15 copies of SCCM 2007 Unleashed. Google Subnet is giving away 15 copies of Web Geek's Guide to Google Chrome. Entry forms can be found on the Cisco Subnet, Microsoft Subnet and Google Subnet home pages. Deadline for entries is August 31.

Network World on Twitter? You bet we are


Cool BlackBerry games
Black HatBlackBerries are known for e-mail, but they are also getting better at mobile games. Here are 10 of the best.

Google facts
IT quizTake this quiz to see how well you know the company – and no fair googling the answers.

Data in Action: Effective data management for smarter outcomes
Date: August 19, 2009 Exhibit Zone 8:00 am PDT / 11:00 am EDT to 12:00 pm PDT / 3:00pm EDT Join us for a special, complimentary Virtual Conference, offering valuable information for lowering IT costs through industry-leading performance, enhanced storage compression and improved automation.
Data in Action: Effective data management for smarter outcomes


The necessary convergence of IT and Facilities
If IT and Facilities could work collaboratively, organizations can operate more efficiently and effectively while still meeting their business objectives. That's why Eaton® is partnering with organizations that develop IT management systems to create an integrated approach to energy management.
The necessary convergence of IT and Facilities

 

August 13, 2009

TOP STORIES | MOST DUGG STORIES

  1. Should your credit report disqualify you for a job?
  2. Top 10 must-have iPhone business apps
  3. How famous OS logos got started
  4. 10 worst video game systems of all time
  5. Why Microsoft is sabotaging desktop virtualization
  6. Do HP, 3Com value claims trump Cisco?
  7. Who says the router can't be sexy?
  8. Microsoft, Apple, Mozilla patches
  9. Patch Tuesday: What the experts are saying
  10. Windows 7: How low can you go?

The Top 10 Data Security Threats
Improve security within your small to medium size business with this straightforward look at the top ten most common network and data compromises. Each threat is clearly explained along with practical techniques and defenses to counter them. Don't miss this opportunity to beef-up your security defenses.
Download now.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: