Search This Blog

Thursday, February 18, 2010

New browser tweaks Chrome security

Security bug opens Google Buzz to hackers | Military seeks one bad-ass universal speech translator

Network World Security Alert

Forward this to a Friend >>>


New browser tweaks Chrome security
The open source engine that forms the basis for Google's Chrome has spawned an ostensibly new browser, Comodo's cleverly named 'Dragon'. Read More


WHITE PAPER: Radware

Rethinking Application Security
Hacker motivation has changed from gaining fame to financial gain. Cyber crime activities now employ a new level of network attacks, which go undetected by standard network-security tools. This paper discusses the changing threat landscape and how you can protect your business from emerging threats. Read More

WHITE PAPER: Sophos

Windows 7 security
With the public release of Windows 7 debates and discussions have been raging on the security improvements in the new platform, and some potential problems have also emerged. In this white paper, we run through the most significant changes and additions, and look at what they might mean to users and administrators. Read now.

Security bug opens Google Buzz to hackers
A common Web programming error could give hackers a way to take over Google Buzz accounts, a security expert said Tuesday. Read More

Military seeks one bad-ass universal speech translator
The military and other parts of the government have long sought the technology that can listen to spoken words, translate them if necessary and identify the voice.  That's the general idea of a system the experimental researchers at the Defense Advanced Research Projects Agency want to develop.  Read More

Facebook hit with class action over privacy changes
A class action lawsuit has been filed against Facebook over changes that the social networking site made to its privacy settings last November and December. Read More

EPIC files privacy complaint against Google Buzz
Despite the changes that Google has made to Buzz following negative reaction to the service, the Electronic Privacy Information Center has filed a complaint with the U.S. Federal Trade Commission charging the search giant with violating user privacy. Read More


WHITE PAPER: Cisco Systems Inc.

Lowering Wireless Data Costs with WAN Optimization
Dramatically lower your wireless data costs while significantly speeding applications with mobile WAN optimization tools. Fuji Xerox Australia describes the benefits it has seen since its deployment in this whitepaper. Learn how you can save 30% on 3G data costs while improving application throughput by 20 times. Learn More

Is there a best certification?
There is no best tool for an undefined job. Nobody can rationally decide whether a hammer or a power drill is the "best tool" without specifying what job the tool is supposed to do. So it is with certifications. Read More

Florida man charged in telephone cramming scheme
A Florida man has been charged with mail fraud and wire fraud in connection with a so-called telephone cramming scheme, in which companies he owned allegedly charged customers for calls they did not make, the U.S. Department of Justice and U.S. Postal Inspector's Miami field office announced. Read More

French net filtering plan moves forward
French lawmakers voted Tuesday to approve a draft law to filter Internet traffic, a measure the government says is intended to catch child pornographers. The bill will now go on for a second and final reading. Read More

Apple's Safari to fall first in hacking contest ... again
The organizer of the Pwn2Own hacking challenge predicts that Apple's Safari browser will go under first; a past winner of the contest isn't so sure. Read More


WHITE PAPER: Tripwire

A Holistic Approach to Compliance Makes Business Sense
IT management has tremendous incentive to figure out a new, more effective and comprehensive approach to meeting information security and compliance goals. This webcast will explore those pain points, the solutions, and the best practices organizations should consider to make strategic information security an enabler of business value. Learn More!

The new risks of cyber-chattiness
Employees are revealing too much about their professional lives online, and that can add up to bad news. Read More

Rogue PDFs account for 80% of all exploits, says researcher
Just hours before Adobe plans to deliver the latest patches for its popular PDF viewer, a security firm said malicious Reader documents made up 80% of all exploits at the end of 2009. Read More

Adobe issues emergency PDF patches
Adobe today released an emergency update that patched a pair of critical vulnerabilities in its popular PDF viewing and editing software. Read More

Hackers update rootkit causing Windows blue screens
Hackers behind the rootkit responsible for crippling Windows machines after users installed a Microsoft security patch have updated their malware so that it no longer crashes systems, researchers said today. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Forrester Research and Network World want to hear from you!
We are collaborating to conduct an on-line-based study focused around data center strategy. The survey should take approximately 12 to 15 minutes to complete. This is both a confidential and anonymous survey and your results will only be used in aggregate. As a special thankyou, all respondents will receive a free copy of the resulting research report from Forrester – a $500 value! Thank you for taking the time to fill out the survey.

Today from the Subnet communities

Massive giveaway from Cisco Subnet: 50 copies of the Cisco Press CCNP Cert Kits kits are up for grabs. Deadline March 31. 15 books on Microsoft PerformancePoint business analytics available, too.

SLIDESHOWS

Videogame your way through the Olympics
If you're bored with (or inspired by) NBC's coverage of the games, there's always your PC or video game system that lets you feel like you're competing in these events.

The technology behind the Vancouver Olympic Games
Bell Canada is claiming the Vancouver 2010 Olympic network as the first IP-based converged network at any Olympic or Paralympic Games. It will be built to provide seamless telephone, wireless, radio and Internet communications services for fans, media, athletes and officials from around the world.

MOST-READ STORIES

  1. Verizon users to get Skype in late March
  2. FCC plans for 100Mbps to 100 million households
  3. Computer hacking charge leveled against Landis
  4. Report: Cisco to kill blade partnership with Dell
  5. Nigerian 419 fraud spam bounces back
  6. What kind of tech etiquette offender are you?
  7. 9 Gmail tips that will let you take a long lunch
  8. Windows Phone 7: Microsoft gets serious about mobile
  9. Microsoft yanks patch causing XP PCs to crash
  10. U.S. broadband adoption sees significant spike

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: