Monday, March 07, 2011

300,000 clients of umbilical cord blood bank at risk of ID theft

Wordpress recovers from huge DDoS attack | 20 hot IT security issues

Network World Security

Forward this to a Friend >>>


300,000 clients of umbilical cord blood bank at risk of ID theft
Storage tapes lost to car break-in outside San Francisco data center The world's largest stem cell bank, Cord Blood Registry, has mailed data-breach warning letters to some 300,000 people after storage tapes and a laptop were stolen from an employee's car. The break-in occurred just before midnight on Dec. 13, 2010 outside of a private data center in San Francisco called 365 Main Street, according to a police report, yet at least some of those put at risk received... Read More


DOWNLOAD: Qualys Inc.

QualysGuard Security & Compliance Suite Trial
The 14-day Trial includes: • Unlimited network mapping and discovery • Unlimited network perimeter scans • PCI Compliance scanning • Web application security scanning • IT security policy creation, scanning and reporting Sign up for your free trial today! Learn more!

WHITE PAPER: Quest Software

Collecting Compliance Evidence: The Role of Event Logs
This Quest Software white paper discusses how to maximize the power of event logs. You'll learn about recent regulation changes, how your company can best prepare for an audit and the solution you need to address these issues. Read More

Wordpress recovers from huge DDoS attack
Politically motivated hackers are being blamed for a large Distributed Denial of Service attack (DDoS) on the Wordpress blog management system that left many customers experiencing severe disruption on Tuesday. Read More

20 hot IT security issues
From malware on Google's Android phones to the U.S. Defense Advanced Research Projects Agency trying to understand how stories or narratives impact security and human behavior, the security world certainly is never boring. Here we take a look at 20 security stories that have shaped the industry in the past few months. Read More


WEBCAST: Cisco

Mobile Powerplay: Secure, High Performance, Unified
The mobile revolution is here—and here to stay. iPhone, iPad, Droid--employees bring their mobile devices into the workplace, and they want access to personal and professional information. This brings a new set of concerns for IT and the business: IT needs to ensure that the corporate network and the access remains secure. Register Now

Prison for four who ran credit card fraud market
Four men who ran what U.K. police say was the largest English-language criminal forum for selling stolen credit card numbers and the tools to steal data were imprisoned for a combined total of more than 15 years, according to the Metropolitan Police. Read More

What constitutes defamation on Twitter? Rocker Courtney Love has an idea
Twitter rant to cost rocker $430,000Rocker Courtney Love has never been known for her shy, refined ways and today it seems one of her bad days when she went on a Twitter rant  will cost her $430,000. The case stemmed from a rant Love posted in 2009 against Dawn Simorangkir the designer of a fancy clothing line. Love allegedly owed her money and much online nastiness ensued. Read More


WHITE PAPER: St. Bernard Software

Compare Web Filters, Enter to win an iPad
View this demo of iPrism Web Filter and learn why throughput speeds of up to 100+ Mbps, anti-virus protection, and seamless Active Directory/Terminal Services integration and reporting included at no charge has made iPrism the appliance-based choice for organizations of all sizes. Learn More

Germany identifies a secure way to deal with spam
In theory, stopping spam is easy: just make it uneconomic to send millions of messages by charging for each one sent, or make senders authenticate their identity to stop address spoofing and simplify blocking. Read More

Beijing to track people's movements via their mobile phones
China plans on tracking the movements of people in Beijing using their mobile phones, a measure that while aimed at relieving traffic congestion, could set off concerns over misuse. Read More

Lock down your mobile handheld devices for ultimate security
As corporations enable more and more true enterprise applications via mobile smart phones and tablets, the need for tight security on these devices will grow. Mobile Active Defense has a non-intrusive solution that mirrors in the mobile world what you've already built for your fixed environment. Read More

Are you dressing the part for the security career you want?
Do the clothes we wear set the stage for success or being stuck in our security careers? Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a Windows 7 Enterprise Technician class for three people. From Cisco Subnet: 15 copies of VMware ESXi books. Enter here.

SLIDESHOWS

20 awesome tech products at DEMO
Build-your-own iPhone and Android apps, cloud services, photo tools and more on display at DEMO Spring 2011.

Top 10 Chrome OS extensions
Though Google is pitching it as an operating system for netbooks and lightweight notebooks, Chrome OS is essentially the Chrome Web browser bolted on top of a bare minimum version of Linux. The following extensions can improve the user experience of Chrome (OS or browser) to give you some of the functionality found in a traditional operating system.

MOST-READ STORIES

  1. IPv6 on home routers and DSL/cable modems: FAIL
  2. Cisco, sources reveal data center next steps
  3. Tablet Tumble: iPad 2 vs. Motorola Xoom
  4. 20 hot IT security issues
  5. Real life HAL 9000: computers reacting to human emotions?
  6. First look at Apple iPad 2: what's new, unchanged, still missing
  7. Open source expert takes on the hardest job at Microsoft
  8. iPad 2 both excites and frustrates business customers
  9. Google gives antiquated 404 page a makeover
  10. 4 reasons why Apple and its iPad still rule the tablet market

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment