Search This Blog

Friday, October 29, 2010

Microsoft Considering Encryption For Bing

Should teachers 'friend' students on Facebook? | IBM, European Union team to swat electronic vampires

Network World Security

Forward this to a Friend >>>


Microsoft Considering Encryption For Bing
If you try to force HTTPS, Bing strips the SSL. In light of the dangers exposed from Firesheep, Microsoft is looking into SSL and other security and privacy solutions for future releases of Bing.No one wants another person to take over their account and impersonate them -- or worse. HTTP session hijacking is nowhere close to a new vulnerability, but with the introduction of the Firefox addon, Firesheep, people who have never hacked, are trying the free and easy-to-use tool. After installation, a person can connect to an open Wi-Fi network, see which users on that network are on insecure social... Read More


WHITE PAPER: NetApp

Storage for Windows Environments
This paper discusses how consolidating your Microsoft SQL Server, Exchange, and SharePoint Server data along with your Windows files using NetApp storage for Windows environments reduces the cost of physical storage as well as ongoing management costs in Windows environments. Read More!

WHITE PAPER: Iron Mountain

Skip the Disk
ESG predicts 40% of companies will leverage cloud-based data protection by year's end. See if your organization is ready to take advantage of avoiding tape and secondary disk, shifting the burden of complex backup processes , increasing availability of existing servers, and more, Read now

Should teachers 'friend' students on Facebook?
Can school teachers "friend" their students on Facebook or other social-networking sites? And can they talk critically or at all about their schools and students in public forums? Read More

IBM, European Union team to swat electronic vampires
IBM, EU Sleeper project wants to reduce impact of computer equipment in stand-by modeIBM and an number of European academic and corporate scientists  today announced a project known as Sleeper that aims to reduce the energy used by everything from mobile phones to laptops and televisions to supercomputers by 10-fold. Read More


WHITE PAPER: Iron Mountain

Eliminate Tape Once and for All
Like many small to mid-size businesses, a Boston-based Toyota dealer was faced with tape capacity constraints, a shortage of physical space and limited IT resources. Learn how automated cloud data protection reduced tape backup costs by 70% and reduced storage needs of PC backups by 90% while providing bullet-proof disaster recovery. Read Now

NASA puts automated software code patents on auction block
NASA's Goddard Space Flight Center this week said it is set to auction an exclusive license to five patents it holds for automated software development on Nov. 11, 2010. Read More

Upgraded retail security standard ignores mobile payments
Version 2.0 of the Payment Card Industry Data Security Standard is being released Thursday by the PCI Security Standards Council, which acknowledges that mobile payment technologies haven't been addressed yet. Read More


WHITE PAPER: Tripwire

Combating Cyberwar Threats
Threats posed by cyberwar cannot be defended using the traditional all-or-nothing security that's aimed solely at keeping attackers out of the government enterprise. Learn why Tripwire's solutions provide the real-time awareness necessary to fight cyberwar. Read More!

Hackers exploit newest Flash zero-day bug
Adobe today confirmed that hackers are exploiting a critical unpatched bug in Flash Player, and promised to patch the vulnerability in two weeks. Read More

E-voting: How secure is it?
Election fraud and vote tampering is as old as government. Before the American Revolution, most voting was done by voice. Voters would call out their pick for all to hear, which lead to intimidation and other nefarious tactics by those hoping to impact election results. The creation of the secret ballot was an improvement, but brought with it another host of possible modes of manipulation. In a quote that is now famous in American history, corrupt politician and Tammany Hall leader Boss Tweed often told constituents to 'vote early, and often.' Read More

Iceland Wants to Help Keep Your Digital Secrets
One of the consequences surrounding the most recent release by Wikileaks of documents relating to America's war in Iraq is a renewed interest in the safe and secure hosting of contentious data. The prospect of hosting secret or questionably legal data within the United States has become increasingly less appealing, due mostly to expanded wiretap authority by the federal government. Read More

Bredolab-infected PCs downloading fake antivirus software
A massive takedown operation conducted by Dutch police and security experts earlier this week does not appear to have completely dissolved the Bredolab botnet, but it is unlikely to recover. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Goodies from the Subnets
We've got 15 copies of books up for grabs: Cisco Nexus Switching and Microsoft SQL Server 2008 R2 Unleashed. Enter to win one!

SLIDESHOWS

The Google Android Quiz
Android OS, with its openness, readily developed applications and flexibility has anchored a new wave of mobile devices that are rapidly gaining popularity. Here's a quiz about the operating system, its devices and history to see how well you really know it. Keep score and rank yourself at the end.

25 hot products from new IT companies
Network World's 25 New IT Companies to Watch are building a broad array of new IT products for the cloud computing and virtualization age. Here's a look at the 25 new IT companies and the technologies they're offering.

MOST-READ STORIES

  1. Hey, you with the open Wi-Fi: You're an idiot
  2. Google now second-largest ISP, carries 6.4% of Internet traffic
  3. Steve Jobs' business card from 1979
  4. Oracle's Ellison vows to prove new HP CEO in on scheme
  5. Open source report: Ubuntu moves away from GNOME
  6. The Google Android quiz
  7. AT&T lagging while others lead on IPv6
  8. How to protect against Firesheep attacks
  9. Single mom of four wins Windows Phone 7 app contest
  10. Microsoft Server 2008 gets virtualization boost

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: