Search This Blog

Monday, January 24, 2011

Yahoo! steals a march on Facebook and Google

Is retaliation the answer to cyber attacks? | Twitter targeted with fake antivirus software scam

Network World Security: Identity Management

Forward this to a Friend >>>


Yahoo! steals a march on Facebook and Google
Big news on the Internet identity front last week when Yahoo! announced they have now become an OpenID "relying party" for IDs from Google and Facebook. I thought it was a bold move on the part of the original Internet directory service, but more than one Facebook fanboy saw it as "Yahoo! Concedes Identity Race by Allowing Login with Facebook and Google OpenIDs." Read More


WHITE PAPER: ParAccel

Stop Fraudulent Transactions
Learn how creative, iterative analysis detects and halts fraud in minutes, rather than hours or days by leveraging: • Massively Parallel Processing • Columnar database for faster responses • Schema-neutral, no tuning required • Built-in compression and encryption Read now!

WEBCAST: Adobe

Turn Unrealistic Deadlines into Realistic Deadlines
Adobe Acrobat X can help give your team the power to turn unrealistic deadlines into realistic deadlines.Join the Adobe Acrobat X software webinar and go from under pressure to overachieving. Learn More

Is retaliation the answer to cyber attacks?
Should revenge assaults be just another security tool large IT shops use to counter cyber attacks? Read More

Twitter targeted with fake antivirus software scam
Twitter has been resetting passwords for accounts that started distributing links promoting fake antivirus software in an attack that used Google's Web address shortening service to conceal the links' destination. Read More

Get more out of encryption than compliance with a mandate
Many organizations are implementing data encryption today because they have to, not because they want to. Compliance with legislative and industry mandates is forcing the issue. Unfortunately, these organizations may not be reaping the full benefit of encryption if they aren't taking a strategic approach. The Vormetric Data Security solution offers a more intelligent approach to encryption that goes beyond simply encrypting a disk. Read More


WHITE PAPER: Siemens

Finding the Value in Unified Communications
This paper examines the four stages of return companies can see from their UC investments: Lower communications costs are followed by lower operational costs, then better productivity, and finally a true competitive advantage. Read More

Playboy on iPad renews debate over privacy, workplace rules
The arrival in March of Playboy on the iPad -- in a browser window -- could present a problem for IT managers who don't want objectionable material on personal hardware used in the workplace. Read More

Social networking security threats taken too lightly
There's a gap between reports of malware generated from social networking sites and the potential threat businesses perceive, according to results of Sophos' s "Security Threat Report 2011". Read More

Quirky moments at Black Hat DC 2011
A Black Hat Conference is nothing if not quirky as security geeks try every stunt possible to show what a clueless world we live in when it comes to security. Anyway, here are some such moments from this week's event. Read More


WHITE PAPER: Quest Software

Choosing the Right Active Directory Bridge Solution for You
The importance of a solid Active Directory (AD) bridge in your diverse IT environment can't be minimized. An AD bridge allows Unix, Linux and Mac systems to coexist with a Windows infrastructure. Further, it consolidates countless identities and passwords, reducing complexity and cost while improving security and productivity. Read Now

Trapster hack may have exposed millions of iPhone, Android passwords
Millions of e-mail addresses and passwords may have been stolen from Trapster, an online service that warns iPhone, Android and BlackBerry owners of police speed traps, the company said. Read More

Mastering computers easier than riding a bike for kids, survey finds
Children five years old and younger are acquiring at least some computer skills at rates higher than they pick up more traditional childhood activities like swimming and bike riding, a survey says. Read More

Gaping security flaw exposed on anti-tamper devices
Security devices used in transportation, packaging and even in accounting for nuclear materials are very vulnerable to attack, two security researchers are warned on Tuesday at the Black Hat security conference. Read More

Cisco beefs up Wi-Fi mobile payment security
Cisco is beefing up wireless transaction security with new software features for its Wi-Fi access points. The vendor says the changes add needed protection over and above that mandated by the Payment Card Industry (PCI) standard. Read More



BECOME AN INSIDER
Get premium content, in-depth reviews, practical tips and exclusive research. All for just signing up. Sign up for free today.

SLIDESHOWS

12 geekiest snow and ice sculptures
Not all tech weenies hunker down indoors when the snow starts piling up and the ice coats the streets. Some put on their mittens and boots and go to work creating fantastic snow and ice sculptures celebrating their tech favorites.

2011's 25 Geekiest 25th Anniversaries
Our fifth annual collection of the year's "geekiest anniversaries" kicks off with The Mentor's "Hacker's Manifesto" and includes such memorable characters as Captain Midnight and Ferris Bueller, institutions the likes of the IETF and Spy magazine, and inventions like the Super Soaker and disposable camera.

MOST-READ STORIES

  1. The case of Apple's mystery screw
  2. Is Apple expanding use of tamper-resistant screw for iPhone?
  3. Gartner slams Cisco's single-vendor network vision
  4. 12 geekiest snow and ice sculptures
  5. Yahoo IPv6 upgrade could shut out 1 million Internet users
  6. Fake GSM base station trick targets iPhones
  7. Google's management shakeup: The day after
  8. Gamers hijacked your server? Might be an inside job
  9. Cause of Windows Phone 7 data spikes found
  10. Is retaliation the answer to cyber attacks?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: