Sears forced to destroy spyware-gathered information As part of its final settlement with the Federal Trade Commission, Sears must destroy any consumer information it collected through a downloadable software application the FTC deemed spyware. Apple fixes Flash snafu in Snow Leopard, patches 33 bugs in Leopard Less than two weeks after Apple launched Snow Leopard, the company today issued the new operating system's first security update. In a separate upgrade, Apple patched 33 vulnerabilities in 2007's Leopard, and about half as many in the even older Tiger. Top 10 cool satellite projects Whether they are monitoring the movement of Great White sharks swimming off the coast of Massachusetts or looking for asteroids streaking towards Earth, satellites are, by their very definition, cool. Here we take a look at some of the most recent technology advances and deployments in recent months. Faster, more affordable satellite communications spark new services CIOs are giving satellite communications a second look, as providers deliver faster, more affordable services and as more government agencies and large corporations focus on keeping networks up and running. Top 5 best practices for firewall administrators Summer vacation is over and the busy holiday season is just a few months away -- not just for you, but for hackers as well. They plan to take advantage of your time off and the relaxed holiday atmosphere at Christmas and New Year's. Michael Hamelin, chief security architect at Tufin Technologies, says don't let your guard down. He provides his top 5 best practices for managing your firewall. How much are you worth on the black market? Ever wondered how much your online identity is worth to a cybercriminal? A new tool from Symantec Corp. will perform the calculation for you. Five Things You Need to Know About Smartphone Security Smartphones share many of the same risks of laptops and are easier to lose. Ajit Arya, deputy CIO for Arlington County, Va., supports both BlackBerrys and iPhones and is working to tighten its policies for managing them. "We have taken some basic steps," he says. For example, one recommended best practice is to require passwords. So far, the county has told employees they can set passwords but has not tried to enforce it as a requirement, Arya says. Microsoft Subnet is giving away training from New Horizons and 15 copies of Windows Server 2008 How-To. Cisco Subnet is giving away 15 copies of Interconnecting Data Centers Using VPLS. Google Subnet is hosting many new bloggers (watch for giveaway information soon.) Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages. Network World on Twitter? You bet we are |
No comments:
Post a Comment