Search This Blog

Wednesday, February 01, 2012

IRS helps bust 105 people in massive identity theft crackdown

Has high-tech helped or hurt crime fighting? DoJ wants to know | The Internet: It ain't designed to protect your privacy

Network World Security

Forward this to a Friend >>>


IRS helps bust 105 people in massive identity theft crackdown
The Internal Revenue Service and the Department of Justice teamed up for a coast-to-coast crackdown on identity thieves this week. Read More


WHITE PAPER: Akamai Technologies, Inc.

Protecting Your Online Channels and Web Applications
This whitepaper gives a broad overview of the ways in which Akamai can help organizations bolster the security of their Web-based assets, with capabilities ranging across the application, network, and DNS layers, as well as solutions focused on Distributed Denial of Service (DDoS) mitigation and business continuity. Learn more

RESOURCE COMPLIMENTS OF: CloudPassage

CloudPassage
Infrastructure-as-a-Service (IaaS) is one of the fastest-growing cloud computing sectors. However, cloud providers usage agreements make the user responsible for protecting servers, applications and data. CloudPassage Halo is the award winning cloud server security platform that has everything you need to secure your cloud servers. Get Free Halo Basic Today!

Has high-tech helped or hurt crime fighting? DoJ wants to know
The US Department of Justice is offering a $1 million grant to study the impact advanced technologies such as mobile communications, sensor networks and Web-based applications have had on the law enforcement community and crime. Read More

The Internet: It ain't designed to protect your privacy
Over at Forbes, Scott Cleland has a pretty good column examining why there aren't more social networks and email services that fully protect user privacy, despite the fact that users always get up in arms whenever companies such as Google and Facebook make changes to their services that could harm our ability t Read More

Cybersecurity Lessons from the Battlefields of Europe
At the beginning of WWI, battlefield tactics had not advanced much since the U.S. Civil War. The general goal was to continually advance on the enemy with waves of infantry attacks and eventually break through the lines by overwhelming enemy defenses. Read More

Hackers infect WordPress 3.2.1 blogs to distribute TDSS rootkit
Hackers are compromising WordPress 3.2.1 blogs in order to infect their visitors with the notorious TDSS rootkit, according to researchers from Web security firm Websense. Read More


WHITE PAPER: Shoretel

Investigating UC Vendors
This must-read publication features independent research from Gartner, providing a wealth of information around best in breed Unified Communication systems. 12 Unified Communications vendor ratings, along with their strengths and cautions, are provided. Read now!

Many pcAnywhere systems still sitting ducks
Symantec warns that its product should not be connected directly to the Internet, yet an estimated 140,000 computers are configured to allow direct external access Read More

Megaupload user content safe for two more weeks
Efforts are intensifying to retrieve data belonging to users of Megaupload's online storage service following the company's dramatic shuttering by U.S. law enforcement authorities this month. Read More

Three reasons why asking risky questions reduces risk
"How are babies made?" Read More

5 key points from Google's privacy-policy letter to Congress
Google sent a 13-page letter to Congress this week that can be summarized in a single sentence: "We're not being evil." Read More


WEBCAST: HP, Microsoft & Intel

HP Enterprise Database Consolidation Appliance
Optimized for Microsoft® SQL Server 2008 R2, the preinstalled, pretuned HP Enterprise Database Consolidation Appliance simplifies database infrastructure management, improves resource utilization, and reduces costs resulting in exceptional levels of return. Learn more

20 Most Anticipated Tech Products of 2012
From Apple's iPhone 5 to next-gen thermostats to OLED TVs, here are 20 tech products we're looking forward to seeing in 2012. Read More

Cybersecurity Report Stresses Need for Cooperation
A lack of honest information-sharing between public and private sectors and among nations hampers cyber defenses, warns a new report by McAfee and the Brussels-based Security and Defense Agenda. Read More

Coverity and Wind River target development insecurity with new alliance
Software development testing firm Coverity and embedded and mobile software firm Wind River have integrated Coverity's security development testing platform with Wind River's embedded software system. Read More

Tips and tricks for upgrading your Android phone
Read More

Safer computing: A how-to guide
It's too easy to injure yourself through poor setup of laptops and PCs at your desk; this guide helps you compute more safely Read More



SLIDESHOWS

The world's geekiest license plates
This slideshow goes out to all those drivers who aren't afraid to say it loud: I'm a geek and I'm proud. It's filled with images of vanity plates so geeky that they prompted someone else to take a picture and post it on Flickr. Enjoy.

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. IPhone 5 production set to begin
  2. 20 most anticipated tech products of 2012
  3. Stealing smartphone crypto keys using plain old radio
  4. SOPA, PIPA Anonymous: Can I have a little hope?
  5. Google, Microsoft, Facebook, Bank of America team to wipe out phishing
  6. Court affirms felony conviction of Palin e-mail snoop
  7. New leaders emerging in WAN optimization market
  8. AT&T appoints chief strategy officer
  9. Kindle Fire king of Android tablets
  10. IPad 3 rumor rollup for the week of Jan. 26

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: