Search This Blog

Thursday, March 31, 2011

UPDATE: Samsung keylogger could be false alarm

FTC puts Google on 20 years of 'privacy probation' | FBI wants public help solving encrypted notes from murder mystery

Network World Security Strategies

Forward this to a Friend >>>


UPDATE: Samsung keylogger could be false alarm
Guest columnist Mohamed Hassan tells how his security software told him a keylogger existed on his new Samsung laptop. Samsung is now denying the claim, saying that the security software registered a false positive. Read More


WEBCAST: Dell

Security: A Multilayered Approach
The resources in this Security KnowledgeVault provide expert advice on everything from creating a multilayered security strategy and deploying a more proactive fight against cybercrime, to realizing when it's time to stop going it alone and seek outside, expert help. Learn more.

WEBCAST: Palo Alto Networks

Forrester: Zero-Trust Architecture Discussion
In this video, John Kindervag, Senior Analyst, Forrester Research defines "zero-trust architecture", outlines the 5 steps needed to make this model actionable, and explains how his clients are adopting a "zero-trust architecture". Read now!

FTC puts Google on 20 years of 'privacy probation'
The Federal Trade Commission has come down like a ton of government regulators on Google and its Google Buzz social networking service for stomping all over their own privacy policies when it launched back in February of 2010. The agreement announced today addresses an FTC charge that Google "used deceptive tactics and violated its own privacy promises to consumers." It makes future demands on Google... Read More

FBI wants public help solving encrypted notes from murder mystery
The FBI is seeking the public's help in breaking the encrypted code found in two notes discovered on the body of a murdered man in 1999. Read More

Cisco releases security, network convergence upgrades for storage switches
Cisco today announced encryption and network convergence features across its entire Data Center Business Advantage portfolio, including its Nexus and MDS storage switches, its Unified Computing System, Data Center Network Manager and its data center operating system, NX-OS. Read More


WEBCAST: IBM

Malware is Everywhere
Get up to speed on the proliferation of security issues and hear about new techniques that combine IBM Rational AppScan and Internet Security Systems (ISS) technologies to scan and identify unwanted, embedded malware. View Now

Hacker group defies U.S. law, defends exposing McAfee website vulnerabilities
The hacker group that exposed holes in McAfee's website knows it's breaking U.S. law, but vows to continue exposing vulnerabilities, especially on security vendor websites. Read More

Google settles FTC complaint over Buzz
Google settles an FTC privacy complaint over its Buzz social network. Read More

Researchers' SSL offloader costs fraction of commercial hardware
Off-the-shelf graphic processing units can perform SSL acceleration as fast as high-end commercial SSL hardware at a fraction of the cost, according to researchers in Korea and the U.S. Read More


WHITE PAPER: Sybase

The Enterprise Mobility Guide 2011
The Enterprise Mobility Guide 2011 features articles by industry experts, analysts and top executives on the latest mobile enterprise trends, real-world success stories, security requirements, device management, app development and more. Get a copy now, compliments of Sybase. Read More

Critical NASA network was open to Internet attack
Six NASA servers exposed to the Internet had critical vulnerabilities that could have endangered Space Shuttle, International Space Station and Hubble Telescope missions -- flaws that would have been found by a security oversight program the agency agreed to last year but hasn't yet implemented, according to a report by the agency's inspector general. Read More

Most approve of hosting games on company gear, survey finds
Only about a third of more than 1,000 respondents to a Network World online survey believe it's always wrong to use company equipment to host private video game sessions for groups of players. Read More

BP employee loses laptop containing data on 13,000 oil spill claimants
The personal information of 13,000 individuals who had filed compensation claims with BP after last years disastrous oil spill may have been potentially compromised after a laptop containing the data was lost by a BP employee. Read More

Get in the ring: US, Europe vow to bash out Internet personal privacy protection
When it comes to protecting personal privacy on the Internet the United States and European Union have often clashed. And it's likely the future won't be much better. But officials from both sides of the ocean say they are now committed to fixing the problems that have kept the two worlds - which some say includes over 700 million users - apart. Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a Windows 7 Enterprise Technician class for three people. From Cisco Subnet: 15 copies of VMware ESXi books. Enter here.

SLIDESHOWS

Tech's youngest billionaires
The nine youngest billionaires in technology run the gamut from a social networking entrepreneur to the creator of the online coupon company, groupon.com. Think you know them all? Let's find out.

No joy for would-be baby shakers and drunk drivers
In this slideshow we'll take a look at some of the most notorious applications that were banned or removed from the big-name app stores.

MOST-READ STORIES

  1. FBI wants public help solving encrypted notes for murder mystery
  2. Samsung installs keylogger on its laptop computers
  3. Cisco data center revamp cuts across switches, servers, storage
  4. Health provider wants algorithm that can predict illness
  5. 'Apple doesn't break,' declares healthcare CIO
  6. FBI: How to be an expert at the black art of cryptography
  7. How to quit your job the right way
  8. McAfee's Web site full of security holes, researcher says
  9. BP employee loses laptop containing data on 13,000 oil spill claimants
  10. No conspiracy theory needed: Tor created for U.S. gov't spying

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_strategies_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: