Search This Blog

Thursday, December 08, 2011

Google Wallet: A brewing battle between Verizon and Google

What's really going on with Carrier IQ on your phone | Carrier IQ security risks overblown?

Network World Security

Forward this to a Friend >>>


Google Wallet: A brewing battle between Verizon and Google
Verizon Wireless is thwarting the use of the Google Wallet mobile payment app, at least for now, on the coming Galaxy Nexus smartphone running on Verizon's 4G LTE network. Read More


WHITE PAPER: Cisco Systems

Get Ahead of the Post PC Era
New devices, mobility, video, the cloud - learn how these powerful market forces are transforming business and the IT industry today. Learn More

WEBCAST: ForeScout Technologies

CISO in the Know - Mitigating Modern Attacks
This webcast examines sophisticated and targeted threats, security gaps, techniques and new technologies with regards to understanding and defending against zero-day threats, propagating worms, low-and-slow attacks and advanced persistent threats (APT). Learn more.

What's really going on with Carrier IQ on your phone
More details are emerging that reveal the Carrier IQ smartphone application does exactly what the vendor says it does. These new findings directly contradict the nearly universal allegations of keylogging, spying, and tracking, all based on the uncritical acceptance of the original analysis by Trevor Eckhart. Read More

Carrier IQ security risks overblown?
Security expert reaction and recently published research says yes Read More

Picture this: Steve Jobs gets bronzed
Software maker has commissioned a life-size sculpture of Apple's Steve Jobs Read More


WHITE PAPER: Splice Communications

The Real Cost of Dealing with Carriers
What is the TCO for your company's data network services and solutions? If you work with one of the large carriers, it's probably a lot higher than you think. Read Now!

Changes Coming To The CISO Position
It's that time of year when industry experts of all types look into their crystal balls and make bold predictions for what's coming in 2012. As far as security goes, lots of these predictions will center on threats (i.e. new attacks patterns, malicious code, etc.) and defenses (i.e. security technologies, services, etc.). Allow me to make offer a trend that has nothing to do with either area.... Read More

FAQ: CNET's "Trojan" installer
CNET is under fire for downloading more than just open source software with the open source software that it makes available on its Web site. Read More


WEBCAST: IBM

InfoSphere MDM Solution for Product Information Management
Learn how leading retailers, distributors and manufacturers leverage IBM InfoSphere Product Information Management solutions to boost supply chain productivity and deliver an optimal customer purchase experience. Learn More

OpenDNS releases tool to encrypt DNS requests
OpenDNS has released a preview of a tool that will encrypt DNS (Domain Name System) requests between a person's computer and the company's lookup service, potentially blocking malicious interceptions. Read More

Facebook disables bug used to expose Zuckerberg photos
A Facebook bug came back to haunt the company's co-founder and CEO, Mark Zuckerberg. Read More

What to do in the event of a data breach?
Even though it now appears there was no terrorist attack on a pump at an Illinois water utility, the SCADA infiltration scare was a reminder that data breaches can come from any number of angles. Read More



SLIDESHOWS

25 free open source projects IT pros will love
We asked SourceForge's new community manager and longtime open source coder, Rich Bowen, to sniff out a few of the cool, lesser-known projects he thinks IT folks will love. What follows are his picks, along with a few of our own.

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. CNET accused of wrapping malware in Windows installer for Nmap security tool
  2. 10 most powerful cloud companies
  3. New Cisco cloud computing framework pushes management, collaboration
  4. Naked truth: Dell Streak discontinued
  5. Verizon cites security issues for nixing Google Wallet
  6. Cloud computing disrupts the vendor landscape
  7. Tablet priced under $100 with Android 4.0 surfaces
  8. RSA security lapse led to March hack, says researcher
  9. Gartner predictions for 2012
  10. iPad 3 rumor rollup for the week of Nov. 28

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: