Search This Blog

Tuesday, October 13, 2009

Microsoft's loss of Sidekick data has users threatening lawsuits

Apple Snow Leopard Flaw Devours User Data; UC Berkeley tightens personal data security with data-masking tool
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by Akamai
rule

Akamai and Cisco on App Delivery
Akamai and Cisco have teamed up to offer a complete set of application delivery solutions addressing delivery over the Internet and private WAN. These solutions can help your organization manage application delivery challenges and provide you with optimal application performance, scalability, availability, and security.

Learn more.

rule

Spotlight Story
Microsoft's loss of Sidekick data has users threatening lawsuits

A cloud outage by a service owned by Microsoft has caused T-Mobile users to lose data stored on both devices and in the cloud. The service is run by Danger Inc., a Microsoft subsidiary that provides data services for Sidekick phones sold by T-Mobile. Contacts, calendar entries, photographs and other personal information of Sidekick users has almost certainly been lost for good thanks to a service disruption... Read full story

Related News:

Apple Snow Leopard Flaw Devours User Data
A serious flaw in Apple's Snow Leopard OS appears capable of wiping user data after the user opens and closes the "guest" account on the afflicted Macintosh.

UC Berkeley tightens personal data security with data-masking tool
To better safeguard the personal data of its students, the University of California at Berkeley (UC Berkeley) has adopted a specialized data-masking technique in its application development work that effectively can hide data in plain sight by mixing it up.

Data-theft trojans and the changing face of the Web
In 2004, Russell Beale of the University of Birmingham penned an interesting article discussing the social changes taking place on the Web. In his summation, Professor Beale noted, "We have split the Web atom – previously atomic units were Web pages – once you'd got them you could analyze them into text and graphics, but you generally dealt in whole pages. Now our atomic unit is much smaller – we can construct things out of fragments of pages. And this makes a second difference – consumers can look only at what they want."

Expert provides more proof hackers hijacked Hotmail accounts
It's almost certain that hackers obtained the Hotmail passwords that leaked to the Internet through a botnet-based attack, a researcher said today as she provided more proof that Microsoft's explanation was probably off-base.

Stephen Gately death exploited by hackers
Hackers have already starting exploiting the death of pop star Stephen Gately just 48 hours after the singer tragically died, says Sophos.

Secrecy vs. privacy
When Bob Blakley talks, I listen. Blakley is vice president and research director for the Burton Group's Identity and Privacy Strategies. Before that he was chief scientist for security and privacy at IBM. He rarely speaks about identity and security issues without weighing all of the possibilities and coming to a reasoned conclusion. So when he says that an analyst from another organization is "dead wrong" you can bet he'll back it up with an elegant argument.

Microsoft Subnet is giving away training from Global Knowledge and 15 copies of Microsoft Expression Web 3 In Depth. Cisco Subnet is giving away training from Global Knowledge and 15 copies of Building Service-Aware Networks. Google Subnet is hosting many new bloggers. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


Cell towers in disguise
Cell towersSome of the cell towers that dwell among us are cleverly hidden; others, not so much.

The ultimate smartphone
SmartphonesWhat if you could combine the best parts of every phone out there?

Yankee Group: Mobile WAN Optimization
The explosion in the number of ways workers connect with the corporate network is an ongoing challenge for IT. This Yankee Group white paper introduces the concept of mobile WAN optimization and discusses how this emerging technology is being used today to improve productivity and reduce costs.
Click here to get this report now.


Virtualization on IBM System Z Advantages
Not all virtualization solutions are created equal. You can achieve up to 80% savings on energy and floor space and up to a 90% reduction on software license fees. Learn about the cost savings, security benefits and unique approach Red Hat provides with open source virtualization integrated into the operating system kernel.
Learn More

 

October 13, 2009

MOST-READ STORIES

  1. Developer ups iPhone app to $40 after complaints about price
  2. Microsoft loses Sidekick users' personal data
  3. House decommissions last mainframe, saves $730k
  4. Sidekick users livid
  5. One by one, carriers succumb to Google Voice
  6. Engineers fix shortcoming of firewalls
  7. 7 tools to ease your Windows 7 rollout
  8. Cisco releases pricing for rack servers
  9. From Sidekick to Gmail: A history of cloud computing outages
  10. 'A bear ate my iPhone!'

ITIC Research Paper: VIPRE Takes Bite out of Bloatware
The remedy to bloatware is a better, more efficient and economical product that is specifically engineered to scan, detect and remove myriad security threats without impacting performance. Read this white paper to learn how a new antivirus technology platform reduces bloat and high resource usage.
Learn More



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments: