Search This Blog

Friday, January 16, 2015

Marriott backs off push to block your Wi-Fi hotspot

12 geekiest snow and ice sculptures | Zombie Cookie: The Tracking Cookie That You Can't Kill

Network World Compliance

Marriott backs off push to block your Wi-Fi hotspot
Marriott International has reversed course and announced that it will not block guests from using personal Wi-Fi hotspots on its properties. This decision comes after the hotel chain, a business partner and an industry association asked the FCC for permission to block some Wi-Fi hotspots, citing security and performance issues related to its own Wi-Fi networks. Guests, as well as tech companies such as Google and Microsoft, came out in opposition to hotels blocking Wi-Fi hotspots.To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: Akamai

Overcoming the Big Disconnect in Web Security
According to a new CSO survey, companies know hackers are targeting them, but too few have plans in place for fighting back. Here are the steps you need to take to eliminate the disconnect. Learn More

WHITE PAPER: Proofpoint, Inc.

The New Art of War: 2014 Targeted Attacks Study
In this study, you'll receive a comprehensive overview of survey results and expert analysis on: *The common threats organizations face *Where to bolster traditional defenses *How to protect employees from targeted attacks View Now>>

12 geekiest snow and ice sculptures
Tech favoritesNot all tech weenies hunker down indoors when the snow starts piling up and the ice coats the streets. Some put on their mittens and boots and go to work creating fantastic snow and ice sculptures celebrating their tech favorites.Space Invaders alienImage by JbernhardtTo read this article in full or to leave a comment, please click here Read More

Zombie Cookie: The Tracking Cookie That You Can't Kill
Helder Mira An online advertising clearinghouse relied on by Google, Yahoo and Facebook is using controversial cookies that come back from the dead to track the web surfing of Verizon customers. The company, called Turn, is taking advantage of a hidden undeletable number that Verizon uses to monitor customers' habits on their smartphones and tablets. Turn uses the Verizon number to respawn tracking cookies that users have deleted.To read this article in full or to leave a comment, please click here Read More

INSIDER
Container wars
A year ago if you asked most system administrators what they would do with a container, chances are you'd get a blank look. That was then. This is now.To read this article in full or to leave a comment, please click here(Insider Story) Read More


: Apperian

App Adoption eGuide
The use of employee mobile apps has boomed, even in the face of the high costs to develop and curate them. Download this eGuide to get the maximum value from your enterprise mobile app investments. Learn More

Glitch in OS X search can expose private details of Apple Mail users
Performing a Spotlight search opens email previews that load external images, even when the Mail client is asked not to do this Read More

Anti-terror cooperation with ISPs is 'essential' in wake of Paris shootings, EU ministers say
EU ministers push for more surveillance powers in wake of shootings at offices of Charlie Hebdo and elsewhere in Paris Read More

FBI access to surveillance program expands in recent years
The FBI has taken a more active role in the NSA's Prism program since 2008, according to an internal report Read More


WHITE PAPER: IBM

Advanced Case Management Leadership Guide
A guide that examines how IBM Case Manager offers an extensible platform for enhancing capabilities and protecting investments with additional value-added ECM capabilities from IBM, as well as industry-specific case management applications and best practices from IBM Business Partners. Read Now

Obama calls for data breach notification law, privacy bill of rights
The White House will push Congress to pass new laws addressing data privacy and ID theft, the president says Read More

CryptoWall ransomware is back with new version after two months of silence
CryptoWall 3.0 uses both the Tor and I2P anonymity networks for increased stealthiness Read More

Ham-fisted phishing attack seeks LinkedIn logins
The emails contain an HTML attachment that seems to be slipping past spam filters Read More

Google nixes widespread malvertising attack
Webmasters were flummoxed when their sites redirected to fraudulent websites hawking products Read More


SLIDESHOWS

Best of CES 2015: In pictures

The best and most noteworthy products and technologies found at CES 2015.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 9 Linux distros to watch in 2015

2. Zombie Cookie: The Tracking Cookie That You Can't Kill

3. Hacker builds wireless Microsoft keyboard keylogger disguised as USB wall charger

4. Cloud price wars give way to feature battles among Amazon, Microsoft and Google

5. Quick look inside IBM's snazzy new mainframe

6. Guided tour of a Google data center

7. Cooler than cubicles: 18 new designs for the office

8. 26 of the craziest and scariest things the TSA has found on travelers

9. Degree-free IT: Can college-skippers thrive in tech?

10. New malware bypasses Active Directory controller


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: