Search This Blog

Friday, February 03, 2012

Microsoft researchers say anonymized data isn't so anonymous

Must-have iPhone/iPad apps for Super Bowl XLVI | Google, Microsoft, Facebook, Bank of America team to wipe out phishing

Network World Compliance

Forward this to a Friend >>>


Microsoft researchers say anonymized data isn't so anonymous
Data routinely gathered in Web logs - IP address, cookie ID, operating system, browser type, user-agent strings - can threaten online privacy because they can be used to identify the activity of individual machines, Microsoft researchers say. Read More


RESOURCE COMPLIMENTS OF: CloudPassage

CloudPassage
Infrastructure-as-a-Service (IaaS) is one of the fastest-growing cloud computing sectors. However, cloud providers usage agreements make the user responsible for protecting servers, applications and data. CloudPassage Halo is the award winning cloud server security platform that has everything you need to secure your cloud servers. Get Free Halo Basic Today!

WHITE PAPER: VCE/VMware

Driving Business Value with VBlock Infrastructure Platforms
With Vblock Infrastructure Platforms, organizations of any size can rapidly deploy a pervasive virtual infrastructure and implement a private cloud while lowering risk and operating expenses. Learn More

Must-have iPhone/iPad apps for Super Bowl XLVI
All the iPhone and iPad apps you'll need for the big game Read More

Google, Microsoft, Facebook, Bank of America team to wipe out phishing
Can industry heavyweights Google, PayPal, Microsoft and AOL -- along with 11 others in high-tech such as Facebook and LinkedIn, as well as the financial world's Bank of America and Fidelity Investments -- succeed in stopping phishing attacks right in their tracks? In uniting behind an effort called DMARC.org unveiled today, the group says it can through policy-based steps filter out spoofed email that attackers use for phishing. Read More

HTC Android phone flaw fix not coming until next week for some
Some users of HTC Android phones will have to wait until next week to get a fix for a problem that could leak credentials used to gain access to Wi-Fi networks, including corporate networks. Read More


WHITE PAPER: Internap

New eBook: Cloud Hosting Buyer's Guide
Organizations are no longer asking "if cloud," but "which cloud?" Whether you've already deployed a cloud solution or you are looking to move to the cloud, you'll find this buyer's guide – complete with cloud configurations, benefits and a vendor scorecard – essential to mapping a cloud strategy that's right for your business. Learn More

Microsoft team discovers malicious cookie-forwarding scheme
Microsoft researchers checking how easy it is to identify users by analyzing commonly collected Web-log data incidentally discovered a cookie-forwarding scheme that can be used to aid session hijacking. Read More

4 Ways to Prevent Domain Name Hijacking
On the night of Monday, January 23, the hacktivist group UGNazi hijacked Coach.com, the Internet domain name of luxury goods manufacturer Coach. For several hours, fashionistas who wanted to ogle Coach's new Willis handbag on Coach.com or get a deal on its Penelope shoulder bag at Coachfactory.com were redirected to UGNazi's cryptic website. Imagine the confusion--and frustration--the redirect must have caused in their coiffed little heads--not to mention the wear and tear on their manicured nails as they typed and retyped coach.com and coachfactory.com into their browser windows. Read More

For 'Malware as a Service' merchants, business is booming
Malware merchants have matured, and are more diversified and dangerous than ever. Read More


WHITE PAPER: Juniper

3-2-1- Data Center Network Architecture
Escalating traffic levels, increasing numbers of applications, and more users have created the need for a data center that can keep pace with demands. Unfortunately, today's data center network is ill-equipped to handle the load, resulting in poor performance. Read how to simplify your network. View Now

Apple updates Lion, patches 51 bugs in Mac OS X
Apple on Tuesday patched 51 vulnerabilities in Mac OS X, most of them critical, in 2012's first security update. Read More

Kelihos botnet, once crippled, now gaining strength
A botnet that was crippled by Microsoft and Kaspersky Lab last September is spamming once again and experts have no recourse to stop it. Read More

5 key points from Google's privacy-policy letter to Congress
Google sent a 13-page letter to Congress this week that can be summarized in a single sentence: "We're not being evil." Read More

10 New Open Source Projects You May Not Know About
With so many open source software projects under way at any given moment, it can be difficult to keep tabs on all that's going on. Read More



SLIDESHOWS

The world's geekiest license plates
This slideshow goes out to all those drivers who aren't afraid to say it loud: I'm a geek and I'm proud. It's filled with images of vanity plates so geeky that they prompted someone else to take a picture and post it on Flickr. Enjoy.

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. iPhone 5 rumor rollup for the week ending Feb. 2
  2. HTC Android phones can leak Wi-Fi passwords
  3. Cisco Ethernet switches make big leap to 40G/100G
  4. iPad 3 rumor rollup for the week ending Jan. 31
  5. 13 Windows 8 features worth knowing about
  6. What Facebook's IPO means for users
  7. F5 shakes up the firewall market
  8. Apple forcing IT shops to 'adapt or die'
  9. Tech's original Great Satan calls out Google for being evil
  10. Can homeland security prevent a cybersecurity critical infrastructure disaster?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: