Search This Blog

Wednesday, January 19, 2011

Facebook halts controversial sharing feature for now

Microsoft adds to security tools for developers | Policy disputes, uncertainties pose safety risks for NASA

Network World Security

Forward this to a Friend >>>


Facebook halts controversial sharing feature for now
Facebook said Monday it will temporarily disable a controversial feature that allows application developers and third-party web sites to access the mobile phone numbers and addresses of certain users. Read More


WHITE PAPER: ParAccel

Stop Fraudulent Transactions
Learn how creative, iterative analysis detects and halts fraud in minutes, rather than hours or days by leveraging: • Massively Parallel Processing • Columnar database for faster responses • Schema-neutral, no tuning required • Built-in compression and encryption Read now!

WHITE PAPER: IBM

Prepare IT for Growth
The need has never been so great to balance evolving IT Services with reduced IT budgets. Learn to position your organization for growth in this uncertain business climate. Read Now

Microsoft adds to security tools for developers
Attack Surface Analyzer security development lifecycle verification tool offered along with consulting services for secure development Read More

Policy disputes, uncertainties pose safety risks for NASA
NASA panel warns of a bumpy future for NASA's safety recordPerhaps for a moment - in those fleeting seconds after President Obama signed the space agency's 2011 budget -- NASA's immediate future seemed set. Read More

Security fail: When trusted IT people go bad
It's a CIO's worst nightmare: You get a call from the Business Software Alliance (BSA), saying that some of the Microsoft software your company uses might be pirated. Read More


WHITE PAPER: Quest Software

Combating Security and Compliance Challenges
Don't wait for a security breach or compliance issue to damage your company. Ongoing monitoring can proactively identify and reduce threats. Learn how you can successfully stop security issues before they become serious problems. Read More

As PC Virus Turns 25, New Worry Emerges: Attack Toolkits
25 years ago, two brothers from Pakistan released the Brain Virus. Today, hackers can buy ready-made toolkits to launch malware attacks - and this trend should concern you. Read More

Criminal charges filed for AT&T iPad attackers
The U.S. District Court of New Jersey files criminal charges against alleged attackers of AT&T-accessible iPads Read More

Study: Cloud breaches show need for stronger authentication
The number of security breaches is rising as organizations increase their reliance on cloud-based services, collaboration tools and enabling users to access networks, Forrester says in a new report. Weak usernames and passwords are making matters worse. Read More


WHITE PAPER: F5 Networks

Securing Web Presence with DNSSEC
This article discusses DNSSEC , a series of DNS protocol extensions which ensure the integrity of data returned by domain name lookups by incorporating a chain of trust into the DNS hierarchy. Read now!

Secunia: Third-party apps remains security weak point
Microsoft is still burdened with a bad reputation among users for security, although figures show its products are more secure than most on a person's computer, according to new data from the Danish security vendor Secunia. Read More

MPack, NeoSploit and Zeus top most notorious Web attack toolkit list
About two-thirds of malicious Web activity can be traced back to botnets and exploit code built using popular attack toolkits like MPack and Zeus sold in the underground economy, according to a new Symantec report. Read More

Will electronic toll systems become terrorist targets?
Weaknesses in 802.11p vehicular wireless networks could make them targets for terrorists seeking to wreak havoc on the nation's highways, according to a briefing scheduled this week at the Black Hat DC conference. Read More



BECOME AN INSIDER
Get premium content, in-depth reviews, practical tips and exclusive research. All for just signing up. Sign up for free today.

SLIDESHOWS

12 geekiest snow and ice sculptures
Not all tech weenies hunker down indoors when the snow starts piling up and the ice coats the streets. Some put on their mittens and boots and go to work creating fantastic snow and ice sculptures celebrating their tech favorites.

2011's 25 Geekiest 25th Anniversaries
Our fifth annual collection of the year's "geekiest anniversaries" kicks off with The Mentor's "Hacker's Manifesto" and includes such memorable characters as Captain Midnight and Ferris Bueller, institutions the likes of the IETF and Spy magazine, and inventions like the Super Soaker and disposable camera.

MOST-READ STORIES

  1. Facebook photos: Opt-out or tag you're it
  2. Will electronic toll system become terrorist targets?
  3. The 10 biggest hoaxes in Wikipedia's first 10 years
  4. "Stealing Wi-Fi" isn't about Wi-Fi
  5. Apple's Jobs takes medical leave
  6. Israel tested Stuxnet worm, says report
  7. Gartner's Magic Quadrant disses Amazon cloud
  8. IBM will not be a networking company
  9. 15 crazy Japanese tech gizmos
  10. Facebook, Google, Yahoo commit to 'World IPv6 Day' trial

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: