Search This Blog

Wednesday, November 24, 2010

HTTPS Everywhere gets Firefox "Firesheep" protection

Most company laptops still not encrypted | Is SAP afraid of a Stuxnet-style attack?

Network World Security

Forward this to a Friend >>>


HTTPS Everywhere gets Firefox "Firesheep" protection
Electronic Frontier Foundation offers protection for Firesheep, other vulnerabilitiesThe Electronic Frontier Foundation (EFF) today said it rolled out a version of HTTPS Everywhere that offers protection against "Firesheep" and other tools that seek to exploit webpage security flaws. Read More


WEBCAST: MegaPath

Hosted VoIP: What about Service Quality?
Learn the basics on how hosted voice services work. Join Joel Thomas and get insight into small business advantages for adopting hosted voice, types of businesses that benefit most from hosted VoIP, and quality indicators for evaluating service providers. Learn More Now.

WHITE PAPER: Quest Software

Choosing the Right Active Directory Bridge Solution for You
The importance of a solid Active Directory (AD) bridge in your diverse IT environment can't be minimized. An AD bridge allows Unix, Linux and Mac systems to coexist with a Windows infrastructure. Further, it consolidates countless identities and passwords, reducing complexity and cost while improving security and productivity. Read Now

Most company laptops still not encrypted
Deep into the age of data loss anxiety, most business laptops are still not secured using technologies such as encryption, a small but perhaps telling survey has revealed. Read More

Is SAP afraid of a Stuxnet-style attack?
Enterprise software provider SAP is stepping up its security stance as its once-isolated systems become increasingly connected to the Internet, posing new risks as hackers diversify their targets. Read More

IT user supergroup forces vendors to take notice
Tech vendors, be warned: The next-generation user group has arrived on the scene, and this time its members will force the world's biggest IT companies to listen closely. Read More


WHITE PAPER: Logitech

The Business Benefits of Desktop Video Collaboration
At your desktop: Advances in the quality and simplicity of affordable desktop video equipment allow organizations to tap the power of unified communications, which can significantly cut costs, increase efficiency, improve business performance and foster more collaboration, regardless of location. Read More

Biggest threat to Internet is government, warns group
Increased government control is the biggest risk to the future of the Internet, according to the Internet Society. Read More

Next Gen 911 Will Accept Texts and MMS
The FCC plans on updating 911 emergency centers to accept text messages, picture messages, streaming video and other 21st century technologies, Wired reports. The update, called Next Gen 911, will expand the service's ability to capture important data -- and keep those reporting the crime out of danger. Read More

Cloud Computing Security
I recently participated in a Cloud Innovation Council CIO roundtable discussion focused on cloud computing in the insurance industry. As expected, the CIOs said that they were concerned about cloud computing security in areas like identity management, data security and network security. Read More


WHITE PAPER: Scriptlogic

PacketTrap IT Network & IT Infrastructure Management
PacketTrap IT is a comprehensive solution that solves problems with bandwidth, connectivity, network & infrastructure performance quickly & easily. PacketTrap supports multiple sites, is easier to use & more complete than traditional network monitoring products. Download a FREE 21 day trial. Learn More

US court eJuror system could lead to whole new list of jury duty excuses
US District court eJuror system rollout nearly completeNow you can say your jury duty request got lost in the cloud or the network was down or the Internet ate it.  That's because the US District Court system is close to completing a rollout of its national eJuror system the lets prospective jurors have option of responding to their jury questionnaire or summons online. Read More

iOS 4.2 Includes Massive Security Update for iPad and iPhone
Apple has finally released the highly-anticipated iOS 4.2. While the attention around iOS 4.2 has been focused on the enhancements and new features--particularly for the iPad, the update also fixes more than 80 vulnerabilities in the iPhone, iPod, and iPad. Read More

Botnet spammer gets lenient 18 months in prison
The Scottish botnet spammer found guilty last month for carrying out a malicious Trojan campaign in 2006 has been sentenced to 18 months in prison. Read More

Small clouds: Security selection criteria
There are a variety of players positioning themselves in the cloud computing arena today. How does a small/medium business or home office user choose a cloud-computer partner? What small cloud security concerns can tip the balance in choosing a cloud computing partner? Read More



Fill out a survey, get rewarded

Get a free Starbucks gift card for participating in a Network World survey about application performance management best practices. Research firm NetForecast is surveying enterprises about APM practices for an upcoming Network World article. The first 100 participants will receive a $5 Starbucks gift card. Click here.

Goodies from the Subnets
We've got SharePoint 2010 training for up to three people from Webucator up for grabs. There's an iPad available, too. Enter to win one!

SLIDESHOWS

Top IT Turkeys of 2010
Thanksgiving is a time for giving thanks for all of the people and things we love, to cherish what's most important to us. But that's for another slideshow. This one's all about taunting the companies, products and people who most resembled a turkey over the last year. So cut me a hockey-puck-shaped slice of jellied cranberry sauce and read on.

Cool Yule favorites: 15 techie gifts we like
Ho Ho Ho, it's time again to get our holiday wish lists together. Here are our 15 favorite products from the 140+ products submitted and tested in this year's Cool Yule Tools holiday gift guide.

MOST-READ STORIES

  1. Sad end for Novell: Sold to Attachmate
  2. Why any great career move should be known as 'a Schmidt'
  3. How dead is the PBX really?
  4. Microsoft spying on users for free
  5. Top IT turkeys of 2010
  6. People who resist authority could be classified as mentally ill
  7. Airports can legally opt-out, kick TSA program to the curb
  8. Attachmate buying Novell for $2.2 billion
  9. Berners-Lee: Social networks are a 'threat to the Web'
  10. Apple releases iOS 4.2

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: