Search This Blog

Friday, October 09, 2009

How dangerous could a hacked robot possibly be?

Cisco extends security controls to 'dark Web'; NASA says 200-yard long asteroid will miss Earth
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by ArcSight
rule

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved.

Building a Successful Security Operations Center

rule

Spotlight Story
How dangerous could a hacked robot possibly be?

It seems like a question ripped from the back of a cheap sci-fi novel: What happens when the robots are turned against us? Read full story

Related News:

Cisco extends security controls to 'dark Web'
Cisco is tackling the 'dark Web' of online content that's not easily indexed with new usage controls for its IronPort S-Series Web Security Appliances.

NASA says 200-yard long asteroid will miss Earth
NASA scientists have recalculated the path of a large asteroid known as Apophis and now say it has only a very slim chance of banging into Earth.

Verizon, McAfee form security alliance
Verizon Business and McAfee have entered into a strategic agreement that will give Verizon Business customers access to McAfee's entire line of enterprise security products and services.

CIA trusts cloud security, but only lprivate clouds
It turns out the CIA is interested in cloud computing, but not cloud services for security reasons.

Gmail and Yahoo also caught in massive phishing attack
A massive phishing attack, which originally hit Hotmail, has also affected Gmail, Yahoo and AOL users, according to the BBC.

Intel IT Director Keeps Network PCs Safe
Want to be your own IT? Small business owners may not want to outsource their PC management or buy an expensive management package--but they still need to keep track of what's happening with the PCs in their network. Intel's IT Director (free) allows you to monitor stats for each PC, such as the amount of disk space used, whether or not the Windows firewall is enabled, and whether or not antivirus software is installed.

Laptop theft gives 850,000 doctors the blues
Another stolen laptop ... and this time we have 850,000 doctors swallowing the bitter pill of knowing that their sensitive professional and personal information may have fallen into hands bent on identity theft. According to this report in Amednews.com, an American Medical Association publication:

Microsoft Subnet is giving away training from Global Knowledge and 15 copies of Microsoft Expression Web 3 In Depth. Cisco Subnet is giving away training from Global Knowledge and 15 copies of Building Service-Aware Networks. Google Subnet is hosting many new bloggers. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


Are netbooks ready for the enterprise?
NetbooksFive reasons to deploy netbooks and five reasons not to.

Demo's biggest stars ever
Demo1,500 innovators have presented at Demo. Here are the best.

Driving Revenue and Increasing Value with Application Performance Management
Service Providers face more competing pressures than ever. You have to deliver a responsive, secure web experience for your customers. Reduce operational costs, while simplifying your complex environment. And find new opportunities for next-generation service delivery to boost revenues. Now you can do it all – with Blue Coat Systems.
Read Now


Web Application Security without Compromise
Web applications are vulnerable in custom application logic, the underlying software platform as well as Web services. Learn how to protect your network against application-level attacks such as SQL injection, cross-site scripting and worm infections.
Click here to learn more.

 

October 09, 2009

MOST-READ STORIES

  1. 7 keys to the ultimate smartphone
  2. Compromised e-maill accounts exploited in fake shopping scam
  3. Harvard's robotic bees generate high-tech buzz
  4. First look at new Windows Mobile 6.5 phones
  5. 15 genius algorithms that aren't boring
  6. 500 words too taxing? Does the 'T' in MIT stand for Tweet?
  7. 10 seriously ridiculous hacks
  8. Gmail, Yahoo Mail join Hotmail; passwords exposed
  9. Laptop theft gives 850,000 doctors the blues
  10. Pentagon: Our cloud is better than Google's

Why Small Companies Should Think Outside Box for Protecting Endpoints
In their "Sector Insight" study, Aberdeen Group investigated the considerations small business should take when selecting anti-malware solutions. Read this paper to learn why Aberdeen recommends small enterprises be open to endpoint security solutions from vendors other than McAfee and Symantec.
Read Now



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments: