Search This Blog

Tuesday, July 05, 2011

Hackers claims Apple online data was compromised

How to live with malware infections | Safer mobile transactions

Network World Security

Forward this to a Friend >>>


Hackers claims Apple online data was compromised
A list of 27 user names and encrypted passwords apparently for an Apple website was posted to the Internet over the weekend along with a warning from hacker group Anonymous that the Cupertino-based computer maker could be a target of its attacks. Read More


WHITE PAPER: Dell

IT Managers Face Security Challenges with Mobile Devices
A recent IDG survey reveals data security is the top barrier to supporting employees' mobile devices. Read more

WHITE PAPER: CA Technologies

Defend Against Insider Threats
Organizations must accept the reality that insider threats are no longer an abstract concept. This paper explains the factors that are increasing the insider threat and details a proactive approach that leverages identity and access management to reduce risk and improve compliance. Learn More

How to live with malware infections
Get used to it: Malware can't be completely blocked or eliminated. But you can manage your PCs, mobile devices, and networks to function despite being infected Read More

Safer mobile transactions
Last week ("More on biometrics") I recommended "biometric recognition as well as using passwords and SMS codes" for more secure mobile banking transactions. Long time reader Patrick O'Kane (he's chief architect for identity and access management services at Unisys) pointed me to a solution that does just that. Read More

In this digital age, what the heck happened to the Constitution?
One of the main privacy issues around the time of the Revolutionary War was the freedom of the people from government intrusion. As we celebrate Independence Day, let's ponder the clash of technology and civil liberties that We the People face 235 years after the adoption of the Declaration of Independence when we started this nation as rebels and revolutionaries to ascertain our "unalienable Rights"... Read More


WHITE PAPER: Extreme Networks

Identity-Aware Networking
Download this whitepaper today discover how IT can integrate identity and networking, enabling new business processes and easing regulatory compliance while improving security. Read now!

Outsourcing to India may not be affected by privacy rules
Personal data sent to India by companies outsourcing work to service providers in the country will not be covered under the country's stringent new rules for the collection of personal data, an executive of a data protection standards company set up by the National Association of Software and Service Companies (Nasscom) said. Read More

Botmaster's extravagant spending attracted police
Conspicuous spending -- not technical sleuthing -- unearthed what may be the largest login-stealing botnet yet known, according to one expert working on the case. Read More

Apple plugs phishing hole on developer website
The hacker group that flagged a vulnerability on an Apple development website, a vulnerability that could have led to phishing attacks against Mac OS X, iPad and iPad developers, says Apple finally fixed the hole that was identified two months ago. Read More


WEBCAST: Cymphonix

Gain Complete Control Over Internet Bound Traffic
The Cymphonix Network Composer is the only network appliance that provides comprehensive clarity into all internet bound network traffic and simply powerful tools to manage that traffic with a holistic approach. Learn More Today!

Cybercrime fight hurt by apathy, law enforcement hurdles
General public apathy and collaboration with the law enforcement community assure that cybercrimes of all sorts will continue to rise. Read More

5 hot social networking sites
The social networking scene is constantly in flux. The big 3 (Facebook, Twitter and LinkedIn) are at the top of the heap right now. But challengers are springing up all the time, hoping to leverage the next big wave into a lucrative IPO. Read More

Survey: US agencies aren't tracking data center use
Many U.S. government agencies aren't tracking their data centers' capacity and energy use, a new survey says. Read More

Anonymous takes another shot at Arizona police
The Anonymous hacking group has taken another swipe at police in Arizona, launching online attacks against several police union websites and publishing e-mail messages stolen from law enforcement officers. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Microsoft Subnet: A set of classes for a Microsoft Cert from Webucator and Polycom videoconferencing system. Enter here.

SLIDESHOWS

12 of the slickest designs in enterprise tech gear available today
Consumer devices tend to get all the praise for their designs, but there's plenty of cool equipment to be found in the enterprise market. When hardware vendors tag-team with renowned industrial designers, the results can be impressive. Here are some of our favorites.

MOST-READ STORIES

  1. NYC mayor demands $600M refund on software project
  2. Anonymous hack-school grads come online in 30 days
  3. Despite controversy, federal, state wiretaps on the rise
  4. Apple, Microsoft consortium beats Google for Nortel patents
  5. Samsung Chromebook out-selling Android tablets on Amazon.com
  6. IBM takes dim view of EU claims
  7. Traditional host-based anti-virus software losing luster?
  8. 10 compelling apps for Cisco Cius
  9. Tablet deathmatch: HP TouchPad vs. Apple iPad2
  10. HP TouchPad goes on sale to mixed reviews

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: