Search This Blog

Tuesday, December 11, 2012

Worst security snafus of 2012

  Researchers show proof-of-concept Microsoft ERP hack | Naughty or nice? Verizon DVR will see and hear you to find out before delivering ads
 
  Network World Security

Forward this to a Friend >>>


Worst security snafus of 2012
The first half of 2012 was pretty bad -- from the embarrassing hack of a conversation between the FBI and Scotland Yard to a plethora of data breaches -- and the second half wasn't much better, with events including Symantec's antivirus update mess and periodic attacks from hactivists at Anonymous. Read More


RESOURCE COMPLIMENTS OF: Ipswitch

Wired & Wireless Networks? WhatsUp Gold can help!
As an IT manager, you're busy taking care of the availability, performance & security of your company's IT infrastructure. But things like BYOD, rogue devices, AP over-subscription & bandwidth policy abuse can make that complex. WhatsUp Gold provides ONE dashboard to visualize, isolate & resolve wireless problems before they impact your organization. Stop being the last to know about your wireless issues- Try WhatsUp Gold free for 30 days!

WHITE PAPER: Trusted Computing Group

4 Steps to BYOD Security
This Architect's Guide shows IT executives and architects how TCG technologies can be applied today to solve an important enterprise problem: BYOD security. Read Now!

Researchers show proof-of-concept Microsoft ERP hack
Security researchers have presented proof-of-concept code capable of accessing the database driving a Microsoft ERP system and then diverting funds while avoiding immediate detection. Read More

Naughty or nice? Verizon DVR will see and hear you to find out before delivering ads
The recent extra-creepy patents by Microsoft and Verizon are meant to detect TV viewers and then take specific actions depending upon what is seen or heard. Why the heck would anybody embrace surveillance technology that could potentially be on the lookout for "thought crime" via the TV? Read More

Safe online shopping: 10 tips to avoid getting burned
You need to buy some gifts. You need to buy them quickly. You can (a) brave the madness of holiday retail shopping at your local mall, rife with screaming children and airborne contagions, or (b) kick back at home and buy all your gifts online, accompanied by nothing more obnoxious than a warm cup of cocoa--or a cold glass of wine. Read More


WHITE PAPER: IBM

Financial Analytics: How IT Leaders Can Help CFOs
CFOs rely on their IT leaders to guide them to the tools that help them keep up with the pace of today's business - tools that help them plan, report, measure and analyze data so they can make smarter decisions and drive more predictable business outcomes. Learn More

Privacy in America continues to erode online, report says
Privacy in America is being transformed in many ways -- the intersection of your personal identity and your online activity is one example. Read More

US FTC: Many kids' apps fail to disclose what information they share
Many mobile apps aimed at children collect and share personal data without notifying parents, potentially violating U.S. law, the Federal Trade Commission said in a report released Monday. Read More

Police-themed ransomware speaks to victims -- literally
A new variant of a Trojan program called Reveton that prevents victims from using their computers and displays rogue messages from law enforcement agencies is using localized voice messages to trick victims into paying made-up fines, according to researchers from antivirus vendor Trend Micro. Read More


WEBCAST: Oracle

Big Data – What's Really New?
According to MIT Sloane School research scientist, Andrew McAfee, big data is much more than a new label for business analytics. Join this Webcast as Andrew shares new research completed by MIT on the impact big data is having across industries. Learn More

Apple hires former Microsoft hacker to work on Mac OS X security
Apple has quietly hired Kristin Paget, a former Microsoft security expert who worked as a hacker for the company to resolve Windows Vista vulnerabilities, to work on its Mac OS X security team. Read More

The 3 biggest threats to your cloud data
Any horror movie fan can tell you the scariest threats are the ones you don't see coming, and the same is true when it comes to threats to cloud data. IT has decades of experience protecting on-premise resources. Virtually no one has even one decade of experience running major SaaS applications, so we should be prepared for some surprises. Read More

Delta Air Lines publishes privacy policy, but reseacher finds a fault
Delta Air Lines quickly published a privacy policy for its mobile application on Friday after being sued by California's attorney general, but a privacy researcher has already found a fault with it and the app. Read More

 
 
 

SLIDESHOWS

10 cloud predictions for 2013
2013 is the year that companies need to implement a serious cloud strategy that puts certain workloads in the public cloud and retains other workloads in-house.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Chambers: Cisco will be more of a software and services company
  2. iPhone 6 rumor rollup for week ending Dec. 7
  3. Tor network used to command Skynet botnet
  4. Tablet sales skyrocketing, driven by iPad mini, Android demand
  5. Riverbed announces three releases for the Steelhead Mobile Controller Appliance
  6. Gartner: Amazon, HP cloud SLAs are 'practically useless'
  7. What if Linux went closed source? Would you still use it?
  8. EMC and VMware spin out big data/cloud division
  9. 12 useful websites for IT security
  10. Android apps of the week ending Dec. 7
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: