Search This Blog

Wednesday, September 09, 2009

Privacy watchdogs, authors urge judge to reject Google Book Search settlement

Military spends $10M to build Web sites aimed at squelching anti-US messages; Thales nShield Connect offers enterprise-class key management
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile


Sponsored by Juniper Networks
rule

Dynamic Security in the Virtualized Data Center Network
Virtual data centers are creating new communications patterns within the network which cannot be secured by conventional, perimeter-oriented designs. Join Juniper Networks for a live Webcast on how to protect your data center's network, extend protection across new data flows, simply management of policy rules and consolidate separate infrastructures.

Click here.

rule

Spotlight Story
Privacy watchdogs, authors urge judge to reject Google Book Search settlement

A group of prominent authors and privacy advocates, including the ACLU and Electronic Frontier Foundation, is urging a New York judge this morning to reject a proposed deal that would grant Google access to and control over millions of digitized books. Read full story

Related News:

Military spends $10M to build Web sites aimed at squelching anti-US messages
Can a series of customized Web sites written in specific, strategic foreign languages actually influence how the world perceives our government's policies? And by-the-way help fight the war on terror? Sounds like a stretch but that is indeed the goal of the project known as the Trans Regional Web Initiative.

Thales nShield Connect offers enterprise-class key management
Setting up the nShield to work with a new application involves getting that application to work with one of the supported key management standards, PKCS#11, Microsoft CryptoAPI/CNG, Jave JCE or OpenSSL, or with one of the other supported security protocols. This can often be somewhat complex, as these are not necessarily the native methods for encryption.

New attacks on cloud servcies call for due diligence by customers
Academics have figured out a way to find particular applications running within cloud providers' networks and to threaten their security.

Voice biometrics haven't caught on just yet
I had a note last week from PR dynamo Melissa Hyland talking about new voice biometrics solutions from Nuance Communications. Since I hadn't covered the company before, I looked up their management and advisers to see if there were any "old friends" – and I found one.

Firefox adds Flash plug-in update protection
Mozilla's next update for Firefox, slated to ship Tuesday, will check for outdated versions of Flash Player, a frequent target of hackers, the company said on Friday.

Online travel takes off with EV SSL security
The image of organised crime rings running rampant across the Internet, creating legitimate-looking Web sites to lure cash from unsuspecting consumers, has many would-be customers scurrying back to the relative safety of the retail store environment.

What is Antivirus 2010?
Lonerlady asked the Answer Line forum about this very insistent program that wants to download itself and protect her computer.

Microsoft Subnet is giving away training from New Horizons and 15 copies of Windows Server 2008 How-To. Cisco Subnet is giving away 15 copies of Interconnecting Data Centers Using VPLS. Google Subnet is hosting many new bloggers (watch for giveaway information soon.) Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


10 sports technologies to love, 5 to hate
Sports technologiesMany technologies help fans enjoy sports. Others just annoy.

Apple disasters
Apple disastersApple has enjoyed huge success with the iPod and iPhone, but Apple has had a number of commercial flops, too.

IDC ROI Calculator for IBM Tivoli Netcool
This ROI calculator from IDC will help you quickly and easily understand the average annual benefit that you may be able to achieve using IBM® Tivoli® Netcool®. The tool and underlying calculations and metrics are based on IDC research of 14 IBM Tivoli Netcool implementations.
Read Now


Sophos Security Solution Center
With the threat landscape constantly changing, you need to have comprehensive protection that isn't complicated. With Sophos, you get complete protection for less investment. You get best-in-class threat protection, and data security and compliance that are simple and affordable so you can get more out of your existing security budget. Review timely resources at this Solution Center.
Visit this site today!

 

September 09, 2009

TOP STORIES | MOST DUGG STORIES

  1. 12 words you can never say in the office
  2. Developer denies software to beat Chinese censors is malicious
  3. Encryption made easier with new key management tools
  4. How to make yourself layoff-proof
  5. Can you see John Chambers directing Cisco to buy Alcatel-Lucent?
  6. Wi-Fi encryption cracked in 60 seconds
  7. Fast, universal broadband: dirty secret about Roadblock
  8. IPhone passcode bugs revealed
  9. BBN, Raytheon and a fresh JFK conspiracy theory
  10. Dirty vendor secrets

Virtualization on IBM System Z Advantages
Not all virtualization solutions are created equal. You can achieve up to 80% savings on energy and floor space and up to a 90% reduction on software license fees. Learn about the cost savings, security benefits and unique approach Red Hat provides with open source virtualization integrated into the operating system kernel.
Learn More



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: