Search This Blog

Friday, February 13, 2015

How not to get slammed by the FCC for Wi-Fi blocking

The World's Email Encryption Software Relies on One Guy, Who is Going Broke | How the NSA is improving security for everyone

Network World Compliance

How not to get slammed by the FCC for Wi-Fi blocking
Rick Hampton, the wireless communications manager for Boston-based Partners Healthcare, has seen the dialogue among network professionals heating up in the wake of the FCC’s sternly-worded enforcement warning about illegal Wi-Fi blocking and says it’s no wonder the commission is fired up. He contends that the way in which many organizations have set up their wireless networks, based on overhyped products that have led them to believe anything goes, just won’t fly in a world where people increasingly are using personal Wi-Fi hotspots to get safe and easy Internet connectivity over unlicensed airwaves wherever they happen to be. After all, the FCC was created by Congress back in the 1930s to put the kibosh on just such intentional interference of radio devices.To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: Attachmate

The Need for Enterprise-Grade File Transfer
From email to Dropbox and FTP, the status quo of file transfer in most organizations is UFT—or Unmanaged File Transfer. That's the troubling finding of a 2013 survey conducted by Osterman Research. Read this paper to learn how enterprise-grade Managed File Transfer (MFT) can help. View Now

WEBCAST: IBM

The Mobile Experience - Increase Your Competitive Advantage
Download this half hour webinar to learn how to increase your competitive advantage using the latest in mobile technology design and trends. Best practices expert, Bill Loller, VP Mobile at IBM, will review what's wrong with the mobile customer experience today and what can be done to improve that experience. Learn More

The World's Email Encryption Software Relies on One Guy, Who is Going Broke
The man who built the free email encryption software used by whistleblower Edward Snowden, as well as hundreds of thousands of journalists, dissidents and security-minded people around the world, is running out of money to keep his project alive.Werner Koch wrote the software, known as Gnu Privacy Guard, in 1997, and since then has been almost single-handedly keeping it alive with patches and updates from his home in Erkrath, Germany. Now 53, he is running out of money and patience with being underfunded.+ ALSO ON NETWORKWORLD: FCC Still Has Ton of Explaining to do About Wi-Fi Blocking +To read this article in full or to leave a comment, please click here Read More

INSIDER
How the NSA is improving security for everyone
The NSA’s core function is gather and analyze data. But the NSA is also expected to secure and protect sensitive information, and as part of that role NSA security experts have launched a program to integrate more commercial off-the-shelf products.To read this article in full or to leave a comment, please click here(Insider Story) Read More

Smart TVs raise privacy concerns
Consumers may want to consider other options, like home theater PCs, that are less aggressive gathering personal data Read More

With employee help, ID theft ring allegedly stole $700,000 in Apple gift cards
Five people have been indicted in scheme that took advantage of Apple 'instant credit' Read More


WHITE PAPER: IBM

5 Tips for Success with Customer Analytics
Discover five tips for success with customer analytics, and how a better understanding of your customers in context increases revenue and deepens loyalty. Learn More

Lawmakers call for investigation of Verizon supercookies
Senators say they may push for legislaton to address the hard-to-defeat tracking cookies Read More

Corporate IT: Beware the dating apps on your users' phones
Common vulnerabilities could be putting your company's data up for grabs Read More

Ransomware authors streamline attacks, infections rise
Security researchers spotted improved versions of ransomware programs for both Windows and Android Read More

US government forming cybersecurity agency to combat online threats
The Cyber Threat Intelligence Integration Center will share threat data among federal agencies Read More


WEBCAST: IBM

What Does Customer Experience Mean for Your Social Business?
Respond promptly to customer needs. Make sure customer interactions are extremely tailored. Provide the right information to the right place at the right time. These are all the actions businesses must take to deliver a seamless customer experience. However, one person can't do it. It is even too much for one department. Learn More

Hackers target health care as industry goes digital
Medical fraud could increase as hackers gain sensitive medical information on victims Read More

DDoS malware for Linux systems comes with sophisticated custom-built rootkit
XOR.DDoS is distributed through SSH brute-force password guessing attacks Read More

Siemens patches critical flaws in industrial wireless gear
The vulnerabilities allow attackers to take control of affected Ruggedcom WIN systems Read More

More than 1B records breached in 2014
In IT security, worst case scenarios became commonplace in 2014, and there’s no end in sight. Headline-making data breaches will likely continue into this year, as businesses, governments and regulators play catch-up to this threat.The nature of the attacks is changing as well, according to Gemalto, a digital security firm. Records that help criminals with identity theft, which is harder to catch and stop, are the leading goal of attackers. The recently disclosed breach of 80 million records at Anthem, the health insurer, was an identity theft attack.To read this article in full or to leave a comment, please click here Read More

Microsoft's patch info 'blockade' pinches security staffs
Security experts yesterday were still frustrated about Microsoft's decision last month to halt advance warnings of each month's patch slate, with one calling it a "blockade" and another arguing that it makes it difficult for IT administrators to do their job. "For the second straight month Microsoft is holding fast to their blockade of information," said Ross Barrett, senior manager of security engineering at Rapid7, in an email. "Microsoft called this an evolution, and I can certainly see why -- they are applying a squeeze to security teams that will eliminate the weak members of the herd." On Jan. 8, Microsoft abruptly shuttered its Advanced Notification Service (ANS), which had posted alerts five days before the arrival of each month's Patch Tuesday collection of security updates. The warnings listed the number of updates and what products they would affect, and described the severity of the underlying vulnerabilities.To read this article in full or to leave a comment, please click here Read More


SLIDESHOWS

25 Valentine's Day gifts for geek gals (and guys)

Geeks at heart, these 25 Valentine's Day gifts are for you and yours.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. CuBox-i4Pro: A whole lotta Linux or Android for not a whole lotta cash

2. Tim Cook explains what he really thinks of Android

3. 10 obscure technologies that could change the world

4. Facebook super-sizes its open networking switch

5. Hummingboard: Giving Raspberry Pi a run for less money

6. WhatsSpy Public tracks WhatsApp activity even if privacy settings are locked down

7. Researchers bypass protections on all Window versions by modifying 1 bit

8. Geeky ways to celebrate Friday the 13th

9. Cisco posts revenue gains, vows to beat VMware's network software

10. Google's new open-source PerfKit framework watches cloud application performance


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: