Search This Blog

Friday, December 03, 2010

2010's biggest security SNAFUs

Google quashes 13 Chrome bugs, adds PDF viewer | FBI warns of new twists on twisted hitman, handgun and adoption scams

Network World Security

Forward this to a Friend >>>


2010's biggest security SNAFUs
That old phrase SNAFU ("Situation Normal, All F---ked Up!") certainly describes our choices for 2010's top 10 security screw-ups. Read More


WEBCAST: Websense, Inc.

Web Security Gateway Solutions Demo
This demo provides a hands on view of Websense Web Security Gateway solutions and how they enable safe productive use of today's dynamic, interactive Web. Learn More Now!

WHITE PAPER: Diskeeper

System Reliability Improvements and Benefits with Diskeeper
Over 300 IT managers evaluate Diskeeper on crucial issues that can make or break a site's viability. Read More

Google quashes 13 Chrome bugs, adds PDF viewer
Google on Thursday patched 13 vulnerabilities in Chrome as it shifted the most stable edition of the browser to version 8. Read More

FBI warns of new twists on twisted hitman, handgun and adoption scams
New twists on old scams are on the rise says FBI's Internet Crime Complaint Center The FBI's Internet Crime Complaint Center's (IC3) today issued a warning about new twists on some pretty twisted scams. First up, the IC3 said the old Hitman Scam has morphed again in a nasty new way.  The Hitman extortion is now targeting nannies and day care providers. FBI details most difficult Internet scams Read More

What security wrought in 2010
Every year, I try to predict the top trends in security for the upcoming year. To give myself a sense of accountability I always look back at how well those predictions worked out and either abandon them or double-down for the next year! It's time to test my annual security predictions for 2010.    Read More


WHITE PAPER: IBM

Protecting Sensitive Data in Non-Production Environments
The ideal data privacy solution must provide the necessary data masking techniques to satisfy the simplest and most complex policy requirements. These techniques must produce results that accurately mask context-sensitive data and include a way to propagate masked data elements consistently across applications and operating environments. Read now

Corporate Executives Remain Lukewarm on Cyber Security
Only 25% of security professionals working at critical infrastructure organizations rate executive management support as "excellent"What's needed for strong cyber security? Good security policies, processes, and technology safeguards of course, but highly-secure organizations also integrate security into their corporate culture -- from new employees the the corner office. Since the proverbial buck stops at the CEOs desk, cyber security-conscious and proactive CEOs are a security professional's best friend. Read More

Google caves in Street View 'trespassing' case, pays $1
Attorney for aggrieved homeowners compares Google's transgression to ... Jim Crow?So Google has gone and settled its long-running "trespassing" case with a Pittsburg couple who got their curtains in a bunch after a Street View photographer traversed their precious private road to take a picture of their house. Google seems happy to have finally made this bit of silliness go away - and for a bargain-basement price of only one dollar -- but this is one instance when I would have preferred... Read More

Police urge international cybercrime cooperation
International policing authorities have urged for greater harmonisation of cybercrime laws between countries to better share information and collaborate on global crime waves. Read More


WHITE PAPER: Brocade

Enterprises Focus on Performance, Coverage, Reliability
802.11n is rapidly becoming the technology of choice for wireless networking. A new survey reveals the challenges 802.11n poses, deployment trends, and the factors driving forward-thinking organizations to migrate. Read now!

NASA finding not the end of the world as we know it, but a different one
NASA funded research finds arsenic-loving bugNASA today said a team of its researchers has discovered a bacteria that can live and reproduce mostly using highly toxic arsenic rather than one of the basic building blocks of life, phosphorus (carbon, hydrogen, nitrogen, oxygen, phosphorus and sulfur are the others in case you forgot your biology). Read More

Quantum key 'blinding' hack deeply flawed, say researchers
The 'blinding' hack of quantum key distribution (QKD) systems publicised by Norwegian researchers earlier this year was based on a seriously flawed setup of the equipment being eavesdropped upon, scientists at Toshiba's Cambridge Research Lab have said. Read More

Toshiba laptop drive embraces new security features
Toshiba has become the latest storage vendor to build Opal Security Subsystem Class (Opal SSC) specification into its self-encrypting drive (SED) for PCs and laptops, the MKxx61GSYD. Read More

WikiLeaks incidents stoke IT security angst
IT pros warn that enterprises without adequate security processes are vulnerable to insider leaks of sensitive information. Read More



Fill out a survey, get rewarded

Get a free Starbucks gift card for participating in a Network World survey about application performance management best practices. Research firm NetForecast is surveying enterprises about APM practices for an upcoming Network World article. The first 100 participants will receive a $5 Starbucks gift card. Click here.

December goodies from the Subnets
SharePoint 2010 power user training for three people from Webucator, plus a brand new iPad available from Microsoft Subnet. Five massive libraries on CCNP, security, NX-OS up for grabs on Cisco Subnet. Enter to win!

SLIDESHOWS

Top IT Turkeys of 2010
Thanksgiving is a time for giving thanks for all of the people and things we love, to cherish what's most important to us. But that's for another slideshow. This one's all about taunting the companies, products and people who most resembled a turkey over the last year. So cut me a hockey-puck-shaped slice of jellied cranberry sauce and read on.

Cool Yule favorites: 15 techie gifts we like
Ho Ho Ho, it's time again to get our holiday wish lists together. Here are our 15 favorite products from the 140+ products submitted and tested in this year's Cool Yule Tools holiday gift guide.

MOST-READ STORIES

  1. Amazon reportedly shows WikiLeaks the door
  2. IBM chip breakthrough may lead to exascale supercomputers
  3. Is a next-generation firewall in your future?
  4. The Linux desktop revolution is dead
  5. The first rule of Windows Phone 7 sales
  6. Verizon sets the bar for future LTE launches
  7. Microsoft's dropped feature is Linux's gain
  8. Inside the labs at Microsoft, HP and IBM
  9. Women desire iPhones, men want Android smartphones
  10. WikiLeaks is not the actual problem

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: