Monday, December 19, 2011

Security roundup: Security concerns slam Google Apps rollout in LA; 760 companies and research institutions hacked?

From Anonymous to Hackerazzi: The year in security mischief-making | Securing the daisy chain

Network World Security

Forward this to a Friend >>>


Security roundup: Security concerns slam Google Apps rollout in LA; 760 companies and research institutions hacked?
The Los Angeles City Council has voted to halt efforts to bring the Los Angeles Police Department (LAPD) into the Google Apps services used by 17,000 other Los Angeles employees. Read More


WHITE PAPER: Symantec

When Good Backups Go bad data recovery Failures
Whether you're considering software, cloud or an appliance for backup, it's time to modernize your infrastructure and make sure your approach includes: • Better protection of VMs • More use of disk and cloud as backup targets • Use of data deduplication and archiving • Simplified configuration, setup and use of Web-based administration View Now

WEBCAST: ForeScout Technologies

CISO in the Know - Mitigating Modern Attacks
This webcast examines sophisticated and targeted threats, security gaps, techniques and new technologies with regards to understanding and defending against zero-day threats, propagating worms, low-and-slow attacks and advanced persistent threats (APT). Learn more.

From Anonymous to Hackerazzi: The year in security mischief-making
It wasn't a good security year from RSA break-in to hacks on Sony, Google and Facebook. Read More

Securing the daisy chain
Some cloud computing vendors outsource parts of their services to subcontractors, who may in turn outsource to others. Here's how to know who has your company's data and how secure it really is. Insider (registration required) Read More

The weirdest, wackiest and coolest sci/tech stories of 2011
This year we find horses helping to build the Internet, Apple having all the money in the world and way more wackiness Read More


WHITE PAPER: NetIQ

First Industy-Wide BSM Maturity Benchmark Study
This first-of-its-kind benchmark study reporting the IT and Business maturity illustrating the business service management imperative today. The survey offers insight into the current and future state of the Business Service Management imperative across global organizations. Learn More

Flash Player scam charges victims for free program via SMS
A creative scheme that charges people via SMS for what should be a free copy of Adobe Systems' Flash player is apparently undergoing a test run on a Russian social network, according to security vendor Bitdefender. Read More

FCC doles out $100K to open source community apps challenge winners
The $100,000 challenge: Develop useful, localized open source apps that make local public information more personalized and usable. Read More

YEAR END: 2011 Gadgets Review
Is there one device to rule them all? It's starting to look more like it as 2011 became the year more consumers started using one device in roles normally filled by two or more gadgets. Read More


WHITE PAPER: Sybase

Scaling Out Query Performance with Sybase IQ 15.3
This paper is meant to provide a holistic perspective and introduce the technical concepts behind DQP in general and Sybase® IQ 15.3's DQP implementation through the PlexQ Distributed Query Platform. Read now.

Goodbye 2011 ... What a year!
Gibbs ponders the year that just shot past ... Read More

Analysts wary of Iran's spy drone hacking claims
Reports that Iranian electronic warfare experts may have succeeded in intercepting and capturing a sophisticated U.S. spy drone were received with skepticism by security analysts. Read More

8 Free Wi-Fi security tools
Read More



SLIDESHOWS

8 Free Wi-Fi security tools
Here are several free programs you can use to do Wi-Fi stumbling and surveying on all the popular platforms - Windows, Mac OS X, and Linux. You'll be able see all the nearby wireless access points (APs) and their details, including channels, signal levels, and MAC address.

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. Why Eric Schmidt's prediction about Android vs. iOS development is wrong
  2. LAN-party house guy spills important cost details
  3. 30 events that shaped Cisco in 2011
  4. Microsoft to start automatic updates of IE without asking users
  5. Apple in 2012: 5 reasons it will be a tough year
  6. 3 tips for avoiding tablet management headaches
  7. Ubiquitous surveillance from Big Brother's wayback machine
  8. iBahn, supplier of hotel Internet services, denies breach
  9. 8 free Wi-Fi security tools
  10. Googler's LAN-party house sparks awe and envy

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment