Search This Blog

Tuesday, August 11, 2009

Twitter Breach Revives Cloud Security Fears

Cybersecurity: Curiouser and curiouser; 61% of young adults illegal download music
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile


Sponsored by IBM NWW
rule

Data in Action: Effective data management for smarter outcomes
Date: August 19, 2009 Exhibit Zone 8:00 am PDT / 11:00 am EDT to 12:00 pm PDT / 3:00pm EDT Join us for a special, complimentary Virtual Conference, offering valuable information for lowering IT costs through industry-leading performance, enhanced storage compression and improved automation.

rule

Spotlight Story
Twitter Breach Revives Cloud Security Fears

The breach of a hosted Google Apps application used by Twitter employees has heightened concerns over the security of cloud computing systems. Read full story

Related News:

Cybersecurity: Curiouser and curiouser
Gibbs is an aficionado of Carrol's Alice and finds a curious parallel between the administration's cybersecurity office and believing six impossible things.

61% of young adults illegal download music
Nearly two thirds of 14 to 24 year olds illegally download music over peer-to-peer (p2p) networks, says UK Music.

Police, councils spy on your calls, SMS and email
Official figures have revealed that in Britain each day last year, local authorities, police and the intelligence services had granted more than 1,500 requests to snoop on the public's phonecalls, emails and text messages.

You don't know tech: The InfoWorld news quiz
It's Apple versus the world this week, as it squared off against Google, hackers, and makers of not-safe-for-kindergarten iPhone dictionaries. But that's not the only news worth quizzing. RadioShack unveiled a new name, Microsoft found a new Bing jingle, and Twitter lost a few million followers, give or take. Are you following all the high-tech news? Prove it by nailing a perfect score. Award yourself 10 points for each correct answer. And no asking your Tweeps for help. Ready? Then begin.

Detecting "bot rot" using log management or SIEM
There are many kinds of tools that can help detect the presence of a bot. Log management and SIEM tools are helpful in detecting the communication that is a hallmark of a botnet. Experts provide their advice on how to use such tools to determine if a bot is at work on your network.

Windows Event Viewer phishing scam remains active
What do you get when you combine malware, IP telephony and an offshore call centre? A new breed of brazen phishing scam designed to target unwary Windows users.

August Giveaways
Cisco Subnet is giving away training from Global Knowledge and 15 copies of Practical Intrusion Analysis; Microsoft Subnet is giving away training from Global Knowledge and 15 copies of SCCM 2007 Unleashed. Google Subnet is giving away 15 copies of Web Geek's Guide to Google Chrome. Entry forms can be found on the Cisco Subnet, Microsoft Subnet and Google Subnet home pages. Deadline for entries is August 31.

Network World on Twitter? You bet we are


Black Hat's best
Black HatHow well you remember the Black Hat conference's most notorious incidents?

Wireless burning questions
IT quizHow much longer are you going to hang onto that Ethernet cable? And other questions.

Easily Keep Pace with HIPPA Changes
New laws and compliance rules for organizations bound by HIPPA will continue to change. Can your infrastructure keep up? Discover how Tripwire solutions support the health care industry with an enterprise-class product that is customizable to address new and changing regulations.
Click here.


Optimizing the Data Center
The Editors of Network World present this Executive Guide: Taking Virtualization Up a Notch. Read it and find out what you need to know about virtualization as it creeps into every corner of your data center.
Learn more

 

August 11, 2009

TOP STORIES | MOST DUGG STORIES

  1. 10 worst video game systems of all time
  2. Do HP, 3Com value claims trump Cisco?
  3. Cyber attackers empty business accounts in minutes
  4. Review: Cisco IPS 7.0 raises the bar
  5. Storage start-ups rethink data access
  6. Cisco's Chambers under fire
  7. Five ways to get affordable certification skills
  8. Nortel CEO Zafirovski steps down
  9. Patch Tuesday has a beating waiting for Windows
  10. IBM gets $16M to bolster brain-on-a-chip tech

Tests Rate Symantec Endpoint Protection No. 1
Download this whitepaper today and discover why independent testers The Tolly Group says: "Symantec Endpoint Protection Small Business Edition 12.0 provides a better user experience than competing solutions right from the beginning."
Learn More



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: