Search This Blog

Tuesday, February 21, 2012

Google says IE privacy policy is impractical in modern Web

Network World Security - Newsletter - networkworld.com
Unique malware samples broke the 75 million mark in 2011 | Privacy spat: Microsoft vs. Google vs. the truth

Network World Security

Forward this to a Friend >>>


Google says IE privacy policy is impractical in modern Web
Microsoft's privacy protection feature in Internet Explorer, known as P3P, is impractical to comply with while providing modern web functionality such as cookie-based features, Google said Monday in response to an accusation from Microsoft that Google had bypassed privacy protections in Internet Explorer. Read More


RESOURCE COMPLIMENTS OF: Villanova University

Invest in Yourself with IS Security Training!
Prep for CISSP® and master the latest IS Security concepts, methods and practices with Villanova's 100% online IS Security programs. Gain new skills to excel as an IT security leader with you prepare for today's information security demands. Enroll by 2/29/12 to lock-in an additional $500 savings on your 3-course master certificate. Click to continue

WHITE PAPER: SonicWALL

Smart Security for Escalating Challenges
This eBook examines how CSOs and IT managers are solving these issues using next-generation firewalls. Read now.

Unique malware samples broke the 75 million mark in 2011
The number of unique malware samples broke the 75 million mark in 2011, McAfee notes in its fourth-quarter threats report for 2011, which also looks back at annual global trends in malicious code activity. Read More

Privacy spat: Microsoft vs. Google vs. the truth
Hoping to fuel the controversy created news that Google sidesteps privacy controls within Apple's Safari Web browser, Microsoft over the holiday weekend accused Google of taking similar liberties with Internet Explorer, a charge Google doesn't actually deny but essentially calls frivolous because everybody does it. And one expert, who played a role in creating the privacy standard at issue here, says... Read More

IRS warns of Dirty Dozen 2012 tax scams
The Internal Revenue Service this week issued its annual "Dirty Dozen" ranking of tax scams the agency says tend to surface around tax season each year. Read More


WHITE PAPER: NetIQ

5 Things You Need to Know About Disaster Recovery Planning
Download this short, easy-to-digest Disaster Recovery eBook today. It's packed with unique planning approaches to make your data center less vulnerable to natural and man-made disasters. Warning, side effects may include reduced stress levels. Learn More!

Anonymous threatens to DDOS root Internet servers
An upcoming campaign announced by the hacking group Anonymous directed against the Internet's core address lookup system is unlikely to cause much damage, according to one security expert. Read More

NASA: You know you're a Geek if….
NASA's always interesting CIO today posted a tribute to Geeks. Read More

Mozilla gives CAs a chance to come clean about certificate policy violations
Mozilla has asked all certificate authorities (CAs) to revoke subordinate CA certificates currently used for corporate SSL traffic management, offering an amnesty to any CAs that had breached Mozilla's conditions for having their root certificates ship with its products. Read More


WHITE PAPER: Webroot

How to Protect Your Business from the Coming Malware Storm
This paper describes the evolution and future of the online threat environment, and outlines the security, economy, performance, and control available to smaller businesses who act now to adopt Security as a Service. Read More Today!

Apple's new OS X tightens screws on some malware
Mac OS X Mountain Lion will offer users a new security model that by default lets users install only programs downloaded from the Mac App Store or those digitally signed by a registered developer. Read More

Lieberman: Cybersecurity Act of 2012 will help us protect critical infrastructure
At a hearing on the bill, witnesses and senators said fast action is necessary to protect critical infrastructure against certain attack. The bill's sponsor promised there's no hidden SOPA-PIPA language in the legislation. Read More

Attackers have all they need from leaky cellphone networks to track you down
GSM cellular networks leak enough location data to give third-parties secret access to cellphone users' whereabouts, according to new University of Minnesota research. Read More

Wringing out $79B worth of IT: Feds debate system duplication
When you have some of the largest IT organizations on the planet, it probably comes as no surprise - though no less of a costly problem --when you find out you have multiple redundant systems. Read More

Start-up Click Security debuts with threat-detection product
Start-up Click Security launches today with a threat-detection product that analyzes and correlates intelligence gathered by sensors on network traffic and activity to provide real-time alerts or even automate defense response to network intrusions or other security threats. Read More



SLIDESHOWS

Firefox faceoff: Nightly vs. Pale Moon vs. Waterfox
Three unofficial Firefox variants take advantage of 64-bit processors and 64-bit version of Windows 7.

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. Report of Google already moving onto Android 5.0 draws doubts
  2. iPad 3 rumor rollup for the week of Feb. 14
  3. Forget about public or private cloud, it's all about hyper-hybrid
  4. RSA brushes off crypto research findings that RSA algorithm is flawed
  5. IRS unearths Dirty Dozen tax scams of 2012
  6. Highlander bot: There can be only one?
  7. Hands on with Apple's new OS X: Mountain Lion
  8. Cisco on Microsoft/Skype: Sour grapes?
  9. EFF promises new fight against software patent abuse, but ....
  10. Exactly what is Homeland Security watching for on Facebook, Twitter, YouTube?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: