Search This Blog

Tuesday, July 29, 2014

FTC urges mobile carriers to help send cramming charges packing

Network World Security - Newsletter - networkworld.com
Is "Bring Your Own Identity" a security risk or advantage? | Mobile security: A mother lode of new tools

Network World Security

Forward this to a Friend >>>


FTC urges mobile carriers to help send cramming charges packing
Looking to throttle the multi-million dollar industry known as mobile cramming, the Federal Trade Commission today issued a report outlining five key steps carriers and legitimate third party providers should do to stop the fraud. FTC The FTC report focused on “carrier billing,” the placement of charges for goods and services of third-party merchants on a mobile phone bill. “Mobile Cramming: An FTC Staff Report” includes recommendations aimed at mobile carriers, merchants who offer goods and services charged directly to mobile phone bills, and billing intermediaries known as aggregators who facilitate the placement of such charges on mobile phone bills.To read this article in full or to leave a comment, please click here Read More


WEBCAST: Cisco Systems

Innovations that Protect Against Advanced Attackers
This webinar will explore new technologies and process for protecting endpoints from advanced attackers and how innovations like continuous data collection combined with big data analytics are pushing the envelope for what security teams can do during and after an advanced attacker puts them in their sights. Learn more >>

RESOURCE COMPLIMENTS OF: CSO Perspective

Save the Date: Boston-Area CSO Perspectives Conference 9/16
The Boston-area CSO Perspectives Conference is being held on Tuesday, September 16 at the Sheraton Framingham Hotel. At this one-day event, produced by CSO and focused on "Defending Against the Pervasive Attacker," you'll have the opportunity to connect with an extensive network of visionary CSOs, CIOs and business experts. Register now.

Is "Bring Your Own Identity" a security risk or advantage?
The “Bring Your Own Identity” (BYOID) trend in which websites let users authenticate using identities established through Facebook, LinkedIn, Google, Amazon, Microsoft Live, Yahoo or other means raises some questions in the minds of IT and business managers. And a survey conducted by Ponemon Institute shows a vast difference in how the IT and business sides think about this so-called BYOID method of authentication.Ponemon asked 1,589 IT and security practitioners and 1,526 business staff personnel, many of them in managerial roles, about what they thought about BYOID and whether it could be used to simplify online authentication for everyone from employees to contractors to retirees to website customers or mobile customers. Both the IT and business sides said they considered BYOID as a way to simplify interactions with customers on the web and mobile devices. Both sides saw it as a way to make registration of new customers easier for them and the organization, plus possible cost reduction related to forgotten passwords and other sign-in problems. But beyond that, the IT and business personnel had differing perspectives about BYOID.To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: HP

Why you need a next-generation firewall
This white paper explores the reasons for implementing NG firewalls and lays out a path to success for overburdened IT organizations. Learn More

INSIDER
Mobile security: A mother lode of new tools
You may know your smartphone, but pretty soon the question will be: How well does your smartphone know you? Read More


WHITE PAPER: BMC Software

IT Friction and Your Organization
This report outlines key issues that cause friction between business users and IT. Learn More

INSIDER
11 signs you've been hacked -- and how to fight back
Redirected Net searches, unexpected installs, rogue mouse pointers: Here's what to do when you've been 0wned Read More

Firm says vulnerability in Tails contained in I2P component
The flaw is one of several found by Exodus Intelligence, a vulnerability broker Read More

INSIDER
Is your network blind to video traffic?
Here's a look at 5 products that manage video in the enterprise. Read More


SLIDESHOWS

Worst data breaches of 2014…So far

We identified the worst of these for the first quarter of the year, and now we show you the worst for April though June.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. 16 weirdest places you'll find Linux

2. 16 terrible computer pranks that could get you fired

3. Superclass: 14 of the world's best living programmers

4. 17 obscure Windows tools and tricks too powerful to overlook

5. 20 cool things you can do with a Raspberry Pi

6. 10 disturbing attacks at Black Hat USA 2014

7. 10 Linux distros to watch in 2014

8. Whatever happened to the IPv4 address crisis?

9. 20 top Android and iOS productivity apps for 2014

10. Top 10 security tools in Kali Linux 1.0.6


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: