Search This Blog

Tuesday, August 02, 2011

Black Hat: System links your face to your Social Security number and other private things

Why Wi-Fi as we know it is in trouble | Skype for iPad finally arrives, then quickly disappears

Network World Daily News AM

Forward this to a Friend >>>


Black Hat: System links your face to your Social Security number and other private things
Soon it will be practicable to take someone's photo on a smartphone and within minutes know their Social Security number and a range of other private data like their personal interests, sexual preference and credit status, researchers will tell the Black Hat security conference this week. Read More


WHITE PAPER: Riverbed

Best Practices in Business Continuity and Disaster Recovery
Business continuity and disaster recovery can mean a rapid return to operations or financial downfall. This IDC white paper highlights the challenges and best practices for implementing continuity and recovery solutions, and details how Riverbed WAN optimization solutions enable firms to meet their recovery requirements. Read now!

WHITE PAPER: F5

Wide Area Application Architecture and Exchange 2010
Massive consolidation can lead to single points of failure which could interrupt service of critical applications. ESG believes that this risk should be addressed by building applications on a Wide Area Application Architecture (WAAA) foundation, spreading applications across multiple data centers. Learn More!

Why Wi-Fi as we know it is in trouble
Aug. 2, 2011 isn't just the day that the U.S. risks defaulting on its debt. It is also 802.11 day (8/02/11), a day when the wireless industry should ponder its future because today's Wi-Fi networks are about to be hit by a perfect storm of problems. Read More

Skype for iPad finally arrives, then quickly disappears
While the deal has yet to be finalized, last night's long-anticipated release of Skype for iPad had the look of a down payment on Ballmer's promise. At least briefly. Read More

In pictures: Fake Apple Stores?
If the retail outlet says "Apple Stoer," it probably isn't run by Apple. Read More

Android Trojan records phone calls
While previous Android malware only logged call information, a new Trojan records actual phone calls. Read More


WEBCAST: CA Technologies

Managing Service Quality Across the Infrastructure
With zero tolerance for latency of web applications and a near total dependence on technology in the workplace as the norm, an unpredictable and unreliable infrastructure is too big a risk for today's speed of business. View Now

Advanced persistent threats force IT to rethink security priorities
The biggest business challenge today, in the minds of many information security officers, is the stealthy online infiltration by attackers to steal valuable proprietary information. The reality, they say, is that these so-called "advanced persistent threats" are so rampant and unrelenting they are forcing IT to rethink network security. Read More

Apple iPad 3 prototypes everywhere
Apple's introduction of the iPad 2 tablet computer on March 2 generated lots of buzz and the product has been a winner, but for many Apple watchers the real excitement is in guessing what the next version will look like. Speculation over what the iPhone 5 will look like has been simultaneously hot. Read More

HP extends Cisco switch trade-in program
HP this week said it has expanded a trade-in program for customers looking to swap out Cisco switches for HP gear. Read More

Tech groups oppose Internet sales tax bill
Several tech trade groups oppose a bill that would require Internet retailers to collect sales tax. Read More


WEBCAST: CA Technologies

Advanced Authentication Methods: Software vs Hardware
Hardware tokens were a popular method of strong authentication in past years but the cumbersome provisioning and distribution tasks, high support requirements and replacement costs have limited their growth. Learn More

Samsung Androids get first SSLVPN client
Last month Cisco announced the release of it Anyconnect SSLVPN client for Android devices. Read More

Firewall Administration Techniques and Tools
Firewalls can be difficult to manage. Firewalls get more and more rules added to their policies to the point of becoming "Swiss cheese". Don't give up hope because there are methods and tools available to help you gain control of your firewall policies. Read More

Nissan eyes powering your house from your car
In a twist on conventional charging for electric cars, Nissan has developed a system that allows a vehicle to supply electricity to power a house. Read More

Best of Google Labs: A Retrospective
As Google shuts down Google Labs, we look back at the many innovations the effort brought us, including Gmail, Google Goggles, Google Earth and Google Maps, among others. Read More



GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

SLIDESHOWS

The Geekiest iPad Apps Ever
We scoured the App Store to find the "geekiest" apps out there for the true purveyor of all things geek.

MOST-READ STORIES

  1. 10 technologies that will change the world in the next 10 years
  2. 'War texting' lets hackers unlock car doors via SMS
  3. iPhone 5 rumor roll-up for the week ending July 29
  4. Why I was banned on Google+ (and how I redeemed myself)
  5. E-commerce sites based on open source code under attack
  6. Say what? GNU Emacs violate the GPL
  7. How to survive Black Hat and Defcon without getting hacked
  8. Black Hat roundup: Let the electric-shock craziness begin
  9. Happy SysAdmin Day. Are you feeling thankful?
  10. New cases suggest iPhone 5 will be thinner, wider and longer than iPhone 4

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: