Search This Blog

Friday, October 14, 2011

Vint Cerf on Google's privacy practices and how getting tagged in a multitude of online media is disconcerting

Air Force goes on cyberdefensive about attack drone virus | Did FBI tail terror suspect using Wi-Fi called 'FBI Van 1'?

Network World Security

Forward this to a Friend >>>


Vint Cerf on Google's privacy practices and how getting tagged in a multitude of online media is disconcerting
Few companies inspire the awe — and the dread about privacy concerns — that Google does, because of its search engine, Google maps and its Street View imagery, its Gmail e-mail and other cloud-based services. Read More


WHITE PAPER: Wildpackets

Eliminate Packet Loss during 10G Monitoring
There are a number of choices for deploying packed-based monitoring and analysis against 10G segments, but as traffic volumes grow, the limitations of many options become problematic. This EMA paper examines the issues surrounding 10G network management and monitoring with emphasis on effective packed-based instrumentation. Read More

WHITE PAPER: ExtraHop

Application Performance Management
In this eGuide, Network World, with sister publication CIO, offer news on the latest trends, best practices, and straightforward advice on these solutions and the challenges of managing application performance. Learn More!

Air Force goes on cyberdefensive about attack drone virus
The Air Force today tried to quash the firestorm of criticism around its handling of the computer virus that hit its unmanned drone program last month. Read More

Did FBI tail terror suspect using Wi-Fi called 'FBI Van 1'?
According to a San Antonio media report, the man accused of planning to assassinate a Saudi diplomat in Washington, D.C., was not the sharpest tool in the box. However, if neighbor accounts are to be taken at face value, the same could be said of the FBI agents tasked with foiling his alleged plot. It's unlikely, however, that those accounts are worth face value. Read More


WHITE PAPER: PhoneFactor

Phones Become the Leading Multi-Factor Authentication Device
According to a leading analyst firm phone-based authentication will comprise 61% of the multi-factor authentication market by the year 2014. This paper will address the key drivers for this market shift away from security tokens and includes real-world case studies from organizations that have made the move to phone-based authentication. Read now

Mac OS X security update causes crashes, say experts
Apple has released a massive security update for Mac OS X along with a new version of its OS, however, according to several reports, installing the patches could render computers unbootable. Read More

Mozilla bashes Microsoft's browser security test
Mozilla has responded to Microsoft's new browser security test with jabs against Internet Explorer. Read More


WHITE PAPER: Certeon, Exinda & Cisco

Special Digital Edition: Wan Optimization
This Network World Spotlight Digital Edition, prepared by Network World editors, provides an in-depth look at the latest WAN optimization developments. Read now

Lawmakers disagree on need for online privacy legislation
While representatives of the online advertising industry questioned whether new laws are needed to protect consumer privacy online, several U.S. lawmakers on Thursday called for new regulations targeting online tracking. Read More

Former HBGary Federal CEO Barr regroups after Anonymous
One might think that former HBGary Federal CEO Aaron Barr would stay far away from anything associated with the hacking group Anonymous, which waged an embarrassing hacking campaign earlier this year that resulted in his resignation. Read More

Patch Tuesday: IE bug could spread virus; .Net affects Mac users
There were no big surprises in this month's Patch Tuesday. Microsoft issued eight updates, two critical, to fix 23 vulnerabilities. However the two critical patches are doozies. One of them fixes all versions of Internet Explorer on all versions of Windows and the other fixes .Net/Silverlight. Read More

2011 tech industry graveyard
WebOS, Cisco Flip camera, Google Labs and the rest: Our list of IT companies, technologies and ideas killed off or headed for the end of life Read More



SLIDESHOWS

26 helpful open source network management tools
Over the last decade or so, open source development has skyrocketed, and network management software has ridden that wave. Many frustrated IT administrators have turned to free tools to monitor, configure and map their networked devices. Here are 26 examples of open source network management software tools to help you do your job.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center and Microsoft training of the winner's choice from Webucator.. Enter here.Also: Please take our survey on certifications and your career

MOST-READ STORIES

  1. 2012 IT budgets, salaries on the rise, survey says
  2. Many users complain of broken iOS5 upgrade process
  3. BlackBerry CTO: No evidence a hack caused RIM outage
  4. Apple releases iOS 5; firmware features some 200 improvements
  5. Google engineer: 'We don't get platforms;' G+ 'pathetic'
  6. The SSL certificate industry can and should be replaced
  7. Don't weat zero-days and wise up stupid and lazy users
  8. 5 cloud security companies to watch
  9. Microsoft launches Firefox, Chrome attack campaign
  10. Michael Dell sends memo, of sorts, to HP

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: