Search This Blog

Friday, September 25, 2009

Futuristic security surveillance system brings Big Brother to life

Futuristic security surveillance system brings Big Brother to life; Social networking sites leaking personal information to third parties, study warns
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by IBM NWW
rule

Increasing Energy Efficiency with x86 Servers
According to the Robert Francis Group, power efficiency will be the number one issue for IT executives for the next decade, at least. Fortunately, the combination of IBM BladeCenter Systems with the new Intel® XeonÒ 5500 Series processors provide the best combination of value, performance, and reliability.

Learn More

rule

Spotlight Story
Cisco unleashes flurry of security advisories

Cisco today released 11 security advisories -- nine for IOS and two for Unified Communications Manager. Several deal with denial of service vulnerabilities and others with holes in encrypted packets, authentication proxies, ACLs, firewall policies and Internet key exchanges. Two involve Cisco's implementation of the SIP protocol. Read full story

Related News:

Futuristic security surveillance system brings Big Brother to life
Researchers are looking to develop an intelligent image system that can monitor large areas, perhaps miles wide, identify potential threats based on the correlation of events and anomalies it detects, and issue timely alerts with few false alarms.

Social networking sites leaking personal information to third parties, study warns
Many major social networking sites are leaking information that allows third party advertising and tracking companies to associate the Web browsing habits of users with a specific person, researchers warn.

A chat with the head of Piryx, democracy's PayPal
Piryx is trying to become a one-stop shop for non-profits and politicians who are looking to raise serious cash for their causes.

Cybersecurity bill pushes university-business alliances
Legislators are trying to encourage cooperation among universities and businesses to develop technology needed to carry out a strategic government effort to fight cyber attacks. http://www.networkworld.com/community/node/44913

Cloud security services are still being hyped
Cloud-based security services will become mainstream within five years as providers iron out the wrinkles and customers become more comfortable with them, according to Gartner.

Contractor pleads guilty to SCADA tampering
The former IT consultant for a oil and gas exploration company has pleaded guilty to tampering with the company's SCADA computer systems.

Phishing scam steals Twitter passwords
Twitter users beware: This scam will not leave you ROFL.

Take two: Nominum tries hosted DNS
Nominum is hoping that the second time is the charm in the outsourced DNS market, as the maker of high-end DNS software announces a hosted service.

Microsoft Subnet is giving away training from New Horizons and 15 copies of Windows Server 2008 How-To. Cisco Subnet is giving away 15 copies of Interconnecting Data Centers Using VPLS. Google Subnet is hosting many new bloggers (watch for giveaway information soon.) Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


Are netbooks ready for the enterprise?
NetbooksFive reasons to deploy netbooks and five reasons not to.

Demo's biggest stars ever
Demo1,500 innovators have presented at Demo. Here are the best.

Reduce Your Private WAN Bill 40-90% With Adaptive Private Networking
Join Steven Taylor as he moderates a discussion on a breakthrough new technology that offers the best of all worlds. Discover Adaptive Private Networking from Talari Networks. Learn how APN enables you to: Deliver more bandwidth per dollar than MPLS services at the same time providing greater reliability and application predictability.
Register Today!


Sophos Security Solution Center
With the threat landscape constantly changing, you need to have comprehensive protection that isn't complicated. With Sophos, you get complete protection for less investment. You get best-in-class threat protection, and data security and compliance that are simple and affordable so you can get more out of your existing security budget. Review timely resources at this Solution Center.
Visit this site today!

 

September 25, 2009

MOST-READ STORIES

  1. Seven advanced car technologies the government wants now
  2. FBI building system that blows away fingerprinting
  3. Aruba slashes prices of 11n Wi-Fi access point
  4. Lotus goes after Microsoft's 'ridiculous and fabricated' figures
  5. Linux vs. Windows 7: A chat with Microsoft
  6. A data breach with a twist
  7. 'Anonymous Digging'? What could go wrong?
  8. Cisco unleashes flurry of security advisories
  9. Holiday tech gadget preview
  10. 13 hot products from DEMOfall '09

Win a 32"LCD at on Sept. 29th
Security Directions: A Virtual Conference Presented by - CIO, Computerworld, CSO, InfoWorld & Network World. Join us for "Protecting Your Enterprise in a Dynamic Infrastructure" - a unique online security event. Listen to CSO publisher, Bob Bragdon and a panel of experts and users, to hear about real-world security deployments. And just for attending, you'll have a chance to win a flat screen LCD TV.
Register Now!



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments: