Search This Blog

Thursday, November 07, 2013

Report: CIA pays AT&T for international call data

Android KitKat could be a strong deterrent to cybercrime and spying | Bruce Schneier wants to make surveillance costly again

Network World Security

Forward this to a Friend >>>


Report: CIA pays AT&T for international call data
AT&T supplies information on international calls that travel over its network, including ones that start or end in the U.S., under a voluntary contract with the U.S. Central Intelligence Agency, The New York Times reported Thursday. Read More


WEBCAST: ForeScout Technologies

Continuous Monitoring & Mitigation: the New InfoSec Frontier
Given network, device, access and threat dynamics, how can IT be more efficient and effective to identify and resolve exposures and attacks? This live broadcast brings together a panel of industry experts to discuss the advantages of leveraging controls and intelligence through a bi-directional integration. View now >>

WHITE PAPER: AT&T

How to navigate the ever-changing mobile device landscape
Smartphones, tablets, social networks, and cloud services are all popular, incredibly useful, and a security risk. These days, the security focus is on mobile devices, as they tend to be used a lot to work with corporate information. Learn More

Android KitKat could be a strong deterrent to cybercrime and spying
Two security features in Android 4.4 KitKat are particularly notable because they are Linux kernel developments. Security-enhanced Linux (SELinux) policies are fully enabled in KitKat, and dm-verity was added. Both features improve the integrity and trust of the Android operating system. Read More

Bruce Schneier wants to make surveillance costly again
The ongoing revelations of governmental electronic spying point to a problem larger than National Security Agency malfeasance, or even of security weaknesses. Rather the controversy arising from Edward Snowden's leaked documents suggest we face unresolved issues around data ownership, argued security expert Bruce Schneier. Read More

5 Disturbing BYOD lessons from the FAA's in-flight electronics announcement
Last week the Federal Aviation Administration (FAA) moved to let fliers use their smartphones and tablets during airline take-offs and landings. But a closer look reveals that the FAA has in fact unwittingly written a guide of what NOT to do when creating a Bring Your Own Device (BYOD) policy. Read More


WHITE PAPER: New Relic

Secure, Reliable & Proven APM for the Enterprise
Your organization depends on your web applications to do business -- from customer facing eCommerce,banking or travel applications, to mission-critical applications for your employees or partners. When it comes to performance, visitors' expectations for service and reliability are high. Read Now

Microsoft warns of zero-day attack, graphics vulnerability exploited through Word
Do you still have images enabled in Outlook? If so, then right now is a great time to disable pictures, since there's a new Microsoft zero-day vulnerability. Read More

5 things you need to know about new Payment Card Industry (PCI 3.0) standard
There's a new version of the Payment Card Industry standard for network security -- PCI 3.0 – out today from the group overseeing its publication, the PCI Security Standards Council. Read More

Automated hacking tools swarm Web site login pages
You may think most visitors to a Web site login page are people, but the reality is the vast majority are automated tools used by criminals looking for weak passwords. Read More


WHITE PAPER: Novell

Mobile Zen: Balancing End-User Productivity and IT Control
Mobility is often seen as a zero-sum game: either end users or IT can win, but never both. Learn how users can have the convenience and mobile productivity they need, while IT retains control over enterprise goods. Victory for both sides. Learn More

Researchers dare AI experts to crack new GOTCHA password scheme
If you can't tell the difference between an inkblot that looks more like "body builder lady with mustache and goofy in the center" than "large steroid insect with big eyes," then you can't crack passwords protected via a new scheme created by computer scientists that they've dubbed GOTCHA. Read More

Location-tracking turns your smartphone into your stalker
It knows when you are sleeping. It knows when you're awake. Read More

NSA spying prompts open TrueCrypt encryption software audit to go viral
A unique effort to crowdsource a security audit of the popular TrueCrypt open source encryption software appears to be going viral three weeks after it was launched by two U.S. based researchers in response to concerns that the National Security Agency may have tampered with it. Read More


SLIDESHOWS

19 Apple rumors that were just wrong

Some of the rumors about Apple over the years were just ridiculous.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Cisco takes fight to SDNs with bold Insieme launch

2. First look: The Cisco/Insieme family

3. Cisco competitors say Nexus 9000 brings closed hardware to an open software game

4. Microsoft Azure gaining ground on Amazon Web Services

5. High-gain patch antennas boost Wi-Fi capacity for Georgia Tech

6. Biggest tech industry layoffs of 2013

7. Microsoft warns of zero-day attack, graphics vulnerability exploited through Word

8. Insieme FAQ: a few key facts

9. Google walks away from Microsoft's IE9

10. Chinese professor builds Li-Fi system with retail parts


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: