Search This Blog

Thursday, March 31, 2011

Samsung installs keylogger on its laptops

Samsung responds to installation of keylogger on its laptop computers | Cisco releases security, network convergence upgrades for storage switches

Network World Security

Forward this to a Friend >>>


Samsung installs keylogger on its laptops
A user discovered a keylogger pre-installed on two brand-new Samsung laptops that the company admitted was there to "monitor the performance of the machine and to find out how it is being used." Mohamed Hassan wrote in Mich Kabay's Security Strategies newsletter that as soon as he received his Samsung R525 laptop, he ran a full system scan and found a commercial keylogger called StarLogger. Read... Read More


WEBCAST: Dell

Security: A Multilayered Approach
The resources in this Security KnowledgeVault provide expert advice on everything from creating a multilayered security strategy and deploying a more proactive fight against cybercrime, to realizing when it's time to stop going it alone and seek outside, expert help. Learn more.

WHITE PAPER: Dell

Guidelines for Choosing a QSA
The independent white paper in this security KnowledgeVault is just one of the resources to help you make the right decision. It details the top 5 questions to ask a prospective QSA firm and offers guidelines on everything from making sure they adequately handle compensating controls to assessing their expertise with virtualization. Learn more.

Samsung responds to installation of keylogger on its laptop computers
In the first part of this two-part report, MSIA 2009 graduate Mohamed Hassan told of discovering a keylogger on two different models of Samsung portable computers. Today he continues the story. Everything that follows is Mr Hassan's own work with minor edits. Read More

Cisco releases security, network convergence upgrades for storage switches
Cisco today announced encryption and network convergence features across its entire Data Center Business Advantage portfolio, including its Nexus and MDS storage switches, its Unified Computing System, Data Center Network Manager and its data center operating system, NX-OS. Read More

FTC puts Google on 20 years of 'privacy probation'
The Federal Trade Commission has come down like a ton of government regulators on Google and its Google Buzz social networking service for stomping all over their own privacy policies when it launched back in February of 2010. The agreement announced today addresses an FTC charge that Google "used deceptive tactics and violated its own privacy promises to consumers." It makes future demands on Google... Read More


WHITE PAPER: Belden Wire

Converged Solutions for Healthcare Infrastructures
Healthcare management is increasingly using converged infrastructures to minimize costs. This white paper discusses the role of a converged infrastructure and how it ensures the bandwidth and signal performance for running multiple patient care applications and medical systems. Read More

Hacker group defies U.S. law, defends exposing McAfee website vulnerabilities
The hacker group that exposed holes in McAfee's website knows it's breaking U.S. law, but vows to continue exposing vulnerabilities, especially on security vendor websites. Read More

Researchers' SSL offloader costs fraction of commercial hardware
Off-the-shelf graphic processing units can perform SSL acceleration as fast as high-end commercial SSL hardware at a fraction of the cost, according to researchers in Korea and the U.S. Read More

Destroyed hard drives kills off UK National ID Cards
If you enjoy watching hard drives packed with personal data being destroyed, then you might be amused by Britain's mass destruction of drives which made up a centralized database. There were about 500 hard drives and 100 backup tapes with personal details and fingerprints for 15,000 people that were publicly destroyed. Read More


WHITE PAPER: Zetta

The Urgency of Recovery and Restore
Data protection is challenging, but the true test is at recovery and restore. Problems may arise from not having data protection versioning or not enough RPO granularity to significant data protection errors and no automated way to catch them. This independent white paper will help you take the pain out of data protection, recovery and restore. Read More >>

Microsoft researchers tout low-cost, programmable prototype data center switch
Microsoft researchers are experimenting with a programmable, low-cost prototype switch they say could help support cloud or other network-delivered services. Read More

Comodo hacker claims another certificate authority
The hacker who claimed credit for breaking into systems belonging to digital certificate vendor Comodo said he has compromised another certificate authority, along with two more Comodo partners, a move that could further undermine trust in the system used to secure websites on the Internet. Read More

BP employee loses laptop containing data on 13,000 oil spill claimants
The personal information of 13,000 individuals who had filed compensation claims with BP after last years disastrous oil spill may have been potentially compromised after a laptop containing the data was lost by a BP employee. Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a Windows 7 Enterprise Technician class for three people. From Cisco Subnet: 15 copies of VMware ESXi books. Enter here.

SLIDESHOWS

Tech's youngest billionaires
The nine youngest billionaires in technology run the gamut from a social networking entrepreneur to the creator of the online coupon company, groupon.com. Think you know them all? Let's find out.

No joy for would-be baby shakers and drunk drivers
In this slideshow we'll take a look at some of the most notorious applications that were banned or removed from the big-name app stores.

MOST-READ STORIES

  1. FBI wants public help solving encrypted notes for murder mystery
  2. Samsung installs keylogger on its laptop computers
  3. Cisco data center revamp cuts across switches, servers, storage
  4. Health provider wants algorithm that can predict illness
  5. 'Apple doesn't break,' declares healthcare CIO
  6. FBI: How to be an expert at the black art of cryptography
  7. How to quit your job the right way
  8. McAfee's Web site full of security holes, researcher says
  9. BP employee loses laptop containing data on 13,000 oil spill claimants
  10. No conspiracy theory needed: Tor created for U.S. gov't spying

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: