Search This Blog

Tuesday, January 18, 2011

Security fail: When trusted IT people go bad

The Mac App Store's hottest productivity apps | Feds charge professed White Hat hackers in breach of AT&T iPad customer data

Network World Daily News PM

Forward this to a Friend >>>


Security fail: When trusted IT people go bad
It's a CIO's worst nightmare: You get a call from the Business Software Alliance, saying that some of the Microsoft software your company uses might be pirated. You investigate and find that not only is your software illegal, it was sold to you by a company secretly owned and operated by your own IT systems administrator, a trusted employee for seven years. When you start digging into the admin's activities, you find a for-pay porn Web site he's been running on one of your corporate servers. Then you find that he's downloaded 400 customer credit card numbers from your e-commerce server. And here's the worst part: He's the only one with the administrative passwords. Think it can't happen? It did. Read More


WEBCAST: Dell

Webcast: Is Virtualization Right for SMBs?
You've heard that large companies embrace virtualization to consolidate their data centers, reduce costs, and improve operating efficiency and IT service levels. However, your data center only has tens of servers, not hundreds or thousands. Should you consider virtualization as well? View this webcast to learn more. Register now!

WEBCAST: Cisco

Mobile Powerplay: Secure, High Performance, Unified
The mobile revolution is here—and here to stay. iPhone, iPad, Droid--employees bring their mobile devices into the workplace, and they want access to personal and professional information. This brings a new set of concerns for IT and the business: IT needs to ensure that the corporate network and the access remains secure. Register Now

The Mac App Store's hottest productivity apps
A rundown of the most popular free and paid productivity apps on the Mac App Store. Read More

Feds charge professed White Hat hackers in breach of AT&T iPad customer data
Professed White Hat hackers face federal criminal charges for grabbing the e-mail addresses of 114,000 AT&T 3G customers who use iPads. Read More

Library system dumps MPLS with cheaper DSL, cable services
The Sno-Isle, Wash., public library system expects to save $400,000 this year by yanking its MPLS network and replacing it with multiple, less expensive broadband connections that include consumer DSL, cable service and even dark fiber. Read More


WHITE PAPER: ParAccel

The Problem with Data Warehousing
Tackle the most complex analytic challenges and glean insight from vast amounts of data. Learn how a columnar-based, massively parallel processing analytic database can provide high performance analytics against complex SQL workloads the most challenging analytic queries. Read now!

Sprint adds $10 monthly data charge to new smartphone users
Sprint Nextel will add a $10 per month Premium Data add-on charge to all newly activated smartphones beginning on Jan. 30. Read More

Open source status report reveals good health and profits
Over the last 15 years I have been an avid user and "developer" (actually more of a facilitator) of open source software. Read More

Facebook halts controversial sharing feature for now
Facebook said Monday it will temporarily disable a controversial feature that allows application developers and third-party web sites to access the mobile phone numbers and addresses of certain users. Read More


WHITE PAPER: ArcSight

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center

As PC Virus Turns 25, New Worry Emerges: Attack Toolkits
25 years ago, two brothers from Pakistan released the Brain Virus. Today, hackers can buy ready-made toolkits to launch malware attacks - and this trend should concern you. Read More

Study: Cloud breaches show need for stronger authentication
The number of security breaches is rising as organizations increase their reliance on cloud-based services, collaboration tools and enabling users to access networks, Forrester says in a new report. Weak usernames and passwords are making matters worse. Read More

Facebook movie "The Social Network" cleans up at Golden Globes
"The Social Network," the blockbuster film based on the story of the Facebook social media site, made the 68th Annual Golden Globe Awards ceremony absolutely geeky this year by winning four major categories. Read More

Policy disputes, uncertainties pose safety risks for NASA
Perhaps for a moment - in those fleeting seconds after President Obama signed the space agency's 2011 budget -- NASA's immediate future seemed set. Read More



BECOME AN INSIDER
Get premium content, in-depth reviews, practical tips and exclusive research. All for just signing up. Sign up for free today.

SLIDESHOWS

12 geekiest snow and ice sculptures
Not all tech weenies hunker down indoors when the snow starts piling up and the ice coats the streets. Some put on their mittens and boots and go to work creating fantastic snow and ice sculptures celebrating their tech favorites.

2011's 25 Geekiest 25th Anniversaries
Our fifth annual collection of the year's "geekiest anniversaries" kicks off with The Mentor's "Hacker's Manifesto" and includes such memorable characters as Captain Midnight and Ferris Bueller, institutions the likes of the IETF and Spy magazine, and inventions like the Super Soaker and disposable camera.

MOST-READ STORIES

  1. Facebook photos: Opt-out or tag you're it
  2. Will electronic toll system become terrorist targets?
  3. The 10 biggest hoaxes in Wikipedia's first 10 years
  4. "Stealing Wi-Fi" isn't about Wi-Fi
  5. Apple's Jobs takes medical leave
  6. Israel tested Stuxnet worm, says report
  7. Gartner's Magic Quadrant disses Amazon cloud
  8. IBM will not be a networking company
  9. 15 crazy Japanese tech gizmos
  10. Facebook, Google, Yahoo commit to 'World IPv6 Day' trial

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: