Thursday, July 28, 2011

Sexting: Loss of control = Embarrassment, bullying & potential prosecution

'War texting' lets hackers unlock car doors via SMS | HBGary Federal legal threats, not Anonymous chase Aaron Barr out of Defcon security conference

Network World Security Strategies

Forward this to a Friend >>>


Sexting: Loss of control = Embarrassment, bullying & potential prosecution
In the first column of this pair of postings, I introduced a discussion of the widespread and increasing practice by young people of sending lewd text and pornographic photos or videos of themselves to friends – only to find the material being distributed publicly and completely out of their control. Today I continue with thoughts on causes and consequences of sexting. Read More


WHITE PAPER: IBM

Next generation data integration from TDWI Research
In November 2010, TDWI sent an invitation via e-mail to the data management professionals in its database, asking them to complete an Internet-based survey. The resulting completed responses of 323 respondents form the core data sample for this report. Read Now

WHITE PAPER: CA Technologies

Service Assurance Defined
This Forrester paper explains the concept of service assurance and highlights how it can address fundamental issues around managing application performance and business services. Learn More

'War texting' lets hackers unlock car doors via SMS
Software that lets drivers unlock car doors and even start their vehicles using a mobile phone could let car thieves do the very same things, according to computer security researchers at iSec Partners. Read More

HBGary Federal legal threats, not Anonymous chase Aaron Barr out of Defcon security conference
Aaron Barr, the tech executive who bailed out of a talk at the Security B-Sides conference after the hacker collective Anonymous attacked the company he worked for, is bailing out of yet another conference, this time chased away by his former boss. Read More

IT security's scariest acronym: BYOD, bring your own device
The torrent of smartphones and tablets entering companies has created some interesting challenges for security managers. The new devices introduce new operating systems, new development environments and new security risks, but no new control. The scariest acronym in security might well be "BYOD," or "bring your own device." As companies develop security and mobility strategies to deal with these devices, it is worth bearing in mind the lessons learned from managing laptops. But it is also worth applying some of the new lessons from smartphones on the laptops, too! Read More


WHITE PAPER: BMC

Workload Automation Challenges and Opportunities
This Executive Brief discusses IDC's perspective on how enterprise workload management requirements are changing and highlights the ways that workload automation solutions can address these emerging requirements. Learn More!

Cloud Security: Will Your Business Data Be Safe In the Cloud?
Is the cloud is a safe place for your critical business data to be? Cloud security consultant Ara Trembly tells you what you need to know and consider before you decide. Read More

The IBM Selectric typewriter turns 50
It has been retired for 25 years but IBM will celebrate the 50th anniversary of the introduction of the iconic Selectric typewriter on July 31. Read More

I Was Wrong About Self-Encrypting Hard Drives
A few years ago, the EVP of marketing at EMC gave me some grief about analyst predictions. He said something like, "if I bet on your predictions and you're incorrect, I spend millions of dollars on the wrong stuff and lose my job. All you have to do is change your PowerPoint slides and move on." He was right. We analysts are always forecasting what will happen in 3-5 years but its rare that anyone... Read More


WHITE PAPER: CA Technologies

Exceptional Application Experience
To improve and ensure the performance and availability of business-critical web applications, organizations need to be able to see and understand the actual user experience. This paper examines the five essentials of application performance monitoring. Learn More

Debate rages over how to manage personal mobile devices used for work
Increasingly, businesses accept the idea that employees should be able to use their personal mobile devices, such as smartphones and tablets, for work. But debate is raging as to whether these employee-owned devices should be managed and secured exactly as corporate-owned devices might be. Read More

Passwords in Mac OS X can be pilfered with new tool
A company that makes password recovery tools has released one that can snatch passwords from a locked or sleeping Macintosh running Mac OS X Lion by plugging another computer into the Mac's FireWire port. The attack technique is several years old and the only way to defend against it is to turn the Mac off. Read More

Exploit demo on tap at Black Hat could 'make your water undrinkable'
A demo at Black Hat next week will remotely hack a car alarm, unlock the doors and start the vehicle, but that's just a parlor trick to call attention to a bigger problem that has the Department of Homeland Security on alert. Read More

Sniffer hijacks secure traffic from unpatched iPhones
Almost anyone can snoop the secure data traffic of unpatched iPhones and iPads using a recently-revised tool, a researcher said today as he urged owners to apply Apple's latest iOS fix. Read More



GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Enter here.

SLIDESHOWS

The Geekiest iPad Apps Ever
We scoured the App Store to find the "geekiest" apps out there for the true purveyor of all things geek.

MOST-READ STORIES

  1. Wham Bam Google Ban: No Pseudonyms on Google Plus Profiles
  2. The 5 biggest IT security mistakes
  3. How to implement IPv6 in a Windows environment: an expert guide
  4. Why I was banned on Google+ (and how I redeemed myself)
  5. 15 incredibly useful (and free) Microsoft tools for IT pros
  6. Cisco rival Juniper lands Microsoft's Muglia
  7. Law firm rallies AT&T customers to block T-Mobile merger with lure of cash
  8. 10 technologies that will change the world in the next 10 years
  9. 10 things you shouldn't be able to buy online
  10. The problem with weak passwords and hijacked Hotmail

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_strategies_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment