Search This Blog

Wednesday, November 17, 2010

Apple moves to yank counterfeit white iPhones from eBay

Network World Security - Newsletter - networkworld.com
A is for Authentication [ABCs of IT] | Apple patches security hole in Mac OS X Server 10.6.5

Network World Security

Forward this to a Friend >>>


Apple moves to yank counterfeit white iPhones from eBay
How much would you pay for white? Apple's complaints are causing eBay to delist so-called white iPhones being offered on its auction Website. The move was reported by the Mac techsite, 9to5Mac.com, which reproduced the delisting notice from eBay to an unidentified eBay seller. The story also included a screen shot of the original listing, which identified the item as an "Apple iPhone WHITE 16GB (Converted)... Read More


WHITE PAPER: Websense, Inc.

Bailing Out Your Budget: How to Lower Your TCO
The Websense® TRITON™ solution is a unified content security solution that not only delivers better protection against modern threats but also does so with the lowest total cost of ownership (TCO). Read More

WHITE PAPER: Trend Micro

ESG Understanding and Enhancing Virtual Desktop Security
Desktop virtualization isn't a mere fad or industry hyperbole. ESG research indicates that large organizations are actively deploying desktop virtualization technology. But why are enterprises jumping on the virtual desktop bandwagon? Find out in this complimentary white paper. Read More!

A is for Authentication [ABCs of IT]
Nov. 16, 2010 - Puppet instructors I.T. Jinglehopper and Jackson are back to explain the IT term authentication, the factors of authentication, and what it means for the world of data security. Read More

Apple patches security hole in Mac OS X Server 10.6.5
Apple on Monday issued a new version of Mac OS X 10.6.5 Server, superseding the update that was released last week. The new build, 10H575 contains a security patch not contained in the earlier build, 10H574, and is recommended for all users who installed the earlier version. Read More

Trend Micro releases free Stuxnet detection tool
Trend Micro has released a tool that administrators can use to scan dozens of computers at a time for Stuxnet, the malicious software program that has raised widespread concern for its targeting of industrial systems made by Siemens. Read More


WHITE PAPER: Tripwire

Narrow the Breach-to-Detection Gap for Better Security
What's more important, security or compliance? Most IT shops are focused on compliance but breaches are still happening. A recent study by Verizon Business concludes that evidence of those breaches tends to be right there in log files. Read More Now.

Bots and social media engagement
As people in the online world become increasingly connected, the reasons to engage with social media expand with remarkable speed. Just consider that only a couple of years ago the leading edge of the Twittersphere was the Los Angeles-based mobile Kogi Korean BBQ which was using Twitter to drive sales … now, there are scores of similar players all over America using the same strategy. Read More

Going beyond enterprise architecture 101
Penn State set to prepare future enterprise architects Bringing the next generation of enterprise architects up to speed won't be an easy task. While most experts agree that the job is a critical one, given the corporate emphasis building business infrastructure in the most technically efficient way, training these future experts has proven difficult.  Read More

Encryption adoption driven by PCI, fear of cyberattacks
A survey of more than 900 IT managers shows that adoption of encryption in their organizations is being driven by two main factors, anxiety about possible cyberattacks and the need to meet the payment-card industry (PCI) data security standards. Read More


WHITE PAPER: IBM

Forrester – Your Enterprise Database Security Strategy 2010
Enterprises must establish a database security strategy that goes beyond authentication, authorization and access control. The key to successful database security is knowing why you're protecting each database, which databases to protect, and how best to secure data against all types of threats. Read now

Google Chrome cited tops 'Dirty Dozen' vulnerable apps list
The Google Chrome browser has earned the dubious distinction of being named the most vulnerable application on the "Dirty Dozen" list of 12 applications with the most discovered software flaws requiring security updates and notifications from January through mid-October. Read More

FTC readies national privacy framework
In an era of massive collecting and selling of personal data, the Federal Trade Commission is preparing to issue a 'privacy framework' that will include guidance about best practices when it comes to personal data privacy. Read More

Privacy questions trail Facebook Messages
After Facebook's struggle with one privacy issue after another this year, some in the industry are raising privacy questions about Facebook's new messaging system. Read More

People Who Resist Authority, Stand Up for Privacy, Could Be Classified As Mentally Ill
If you resist authority or are a nonconformist who speaks up in defense of freedom and privacy, then some psychiatrists might recommend that you should be "cured" or locked away in a mental institution.If you a nonconformist who speaks up in defense of freedom and privacy, then you might be interested to know that some psychiatrists might recommend that you should be "cured" or locked away in a mental institution. Read More



Fill out a survey, get rewarded

Get a free Starbucks gift card for participating in a Network World survey about application performance management best practices. Research firm NetForecast is surveying enterprises about APM practices for an upcoming Network World article. The first 100 participants will receive a $5 Starbucks gift card. Click here.

Goodies from the Subnets
We've got SharePoint 2010 training for up to three people from Webucator up for grabs. There's an iPad available, too. Enter to win one!

SLIDESHOWS

Microsoft Windows after 25 years: A visual history
More than nine out of 10 computers run some version of Windows. But no one could have predicted that would be the case when Windows 1.0 launched 25 years ago as a graphical front end for MS-DOS. Here's a look at Windows through the years and some thoughts on what the future might hold.

Cool Yule favorites: 15 techie gifts we like
Ho Ho Ho, it's time again to get our holiday wish lists together. Here are our 15 favorite products from the 140+ products submitted and tested in this year's Cool Yule Tools holiday gift guide.

MOST-READ STORIES

  1. People who stand up for privacy could be classified as mentally ill
  2. Google Chrome tops 'Dirty Dozen' vulnerable apps list
  3. Microsoft breaks petaflop barrier, loses Top 500 spot to Linux
  4. Juniper looks to one-up Cisco again in core routing
  5. U.S. building next wave of supercomputers
  6. Traveler to TSA: If you touch my junk, I'll have you arrested
  7. Lack of overheating protection in Windows Phone 7 HTC Surroun
  8. Microsoft Lync: What you need to know
  9. 10 offbeat gift ideas: 2010 edition
  10. Apple promises unforgettable something or other tomorrow

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: