Search This Blog

Thursday, August 11, 2011

Dishonest methods involving online reputation management

USB devices: The big hole in network security | Vulnerable Insulin Pumps Demostrate Pervasive Risks

Network World Security Strategies

Forward this to a Friend >>>


Dishonest methods involving online reputation management
Search engine optimization (SEO) to raise the visibility of a specific company or person can involve questionable methods. For example, search engines can be manipulated to trick Web crawlers and increase the visibility of Websites to search engines. Read More


WHITE PAPER: CA Technologies

The Value of Service-Centric Visibility
IT organizations are under pressure to avert problems before they occur. To achieve the proactive approach required and move to the next level of service delivery, they need "service-centric" visibility that ties infrastructure components to the services that rely on them. Read More

WHITE PAPER: CA Technologies

CIOs Feel the Pressure to Optimize the Online Experience
In this exclusive survey, CIOs weigh in on the business impact of application performance. This white paper presents the survey results and offers guidance on building a business case to optimize the customer experience with consistently excellent application performance. Learn More

USB devices: The big hole in network security
USB devices may be important tools foir business but they have security issues Read More

Vulnerable Insulin Pumps Demostrate Pervasive Risks
I was catching up on the news from the DefCon security event in Las Vegas when one particular story caught my eye. A security researcher named Jay Radcliffe, a diabetic, discovered that he could hack his own Insulin pump and prompt the device to deliver either too much or too little Insulin. By exploiting this vulnerability, a hacker could literally use technologies like wireless networking to commit... Read More

Guilty plea from one man identity theft operation that netted $770,000
The US Department of Justice said a man who rang up 4,400 fraudulent charges totaling $770,674 from 2,341 stolen credit pleaded guilty today in the District Court in Alexandria, Va. Read More


WHITE PAPER: F5 Networks

Achieving Enterprise Agility in the Cloud
Working together, VMware, F5 Networks, and BlueLock offer integrated solutions that help enterprises develop agility so they can easily and efficiently use cloud resources on demand to meet their changing needs. Read More Today!

Anonymous Allegedly Threatens to 'kill' Facebook
The hacking group Anonymous is allegedly threatening to "destroy" Facebook on Nov. 5, accusing the social networking site of spying on users, cooperating with authoritarian governments and abusing people's privacy. Read More

China Hit By 480,000 Trojan Horse Attacks in 2010
China said it saw close to 480,000 Trojan horse attacks in 2010, with almost half originating from outside the country, according to a government security agency. Read More

Improve Your Security Leadership with One Lesson From Improv
"Your job is to make your partner look like a rock star." Read More


WHITE PAPER: GFI Software

Email Security in Small and Medium-sized Businesses
No organization can afford to operate without an email security strategy. The risk landscape is constantly changing with new threats surfacing every day. This white paper looks at email security in small and medium businesses, the solutions available and what features SMBs cannot do without. Read now

Defcon: VoIP makes a good platform for controlling botnets
Botnets and their masters can communicate with each other by calling into the same VoIP conference call and swapping data using touch tones, researchers demonstrated at Defcon. Read More

Microsoft patches 1990s-era 'Ping of Death'
Microsoft today issued 13 security updates that patched 22 vulnerabilities in Internet Explorer, Windows, Office and other software, including one that harked back two decades to something dubbed "Ping of Death." Read More

10 cloud management companies to watch
Managing the cloud is a tricky endeavor. Here are 10 tools and services that can help Read More



GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

SLIDESHOWS

4 reasons Windows Phone 7 will eventually beat iPhone and Android
Here are four reasons why Microsoft will be a major smartphone player in a few years. And three reasons it won't.

MOST-READ STORIES

  1. DARPA set to blast Falcon Mach 20 test flight
  2. Hosed productivity suites: Google Apps or Microsoft Office 365?
  3. Did Google+ ban cleavage-snuggling LEGO stormtrooper?
  4. How is the Cisco 76% off Nexus sale going over with customers? Not well.
  5. Privacy groups protest massive DHS database of secret watchlists
  6. 4 reasons Windows Phone 7 will beat iPhone and Android
  7. Raid on ChronoPay explains the demise of Mac Defender malware
  8. Operating Systems Solutions sues Apple over OS X's use of quick booting
  9. Microsoft expects Internet Explorer exploits within 30 days
  10. Tech survivors: Geek technologies that still thrive 25 to 50 years later

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_strategies_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: