Tuesday, June 26, 2007

Can cell phones be hacked? How to be a digital detective

Network World

Security News Alert




Network World's Security News Alert, 06/26/07

Can cell phones be hacked? Security experts say yes, but it’s not that easy, 06/25/07: Can cell phones be hacked? Security experts say, yes, but it’s neither easy nor widespread.

How to be a digital detective, 06/26/07: It could be an insider suspected of a security breach. It could be a case of harassing phone calls and e-mails. It could be an employee violating company rules. Here's what every network manager should know about computer forensics.

Data-leak prevention companies buoyed by surveys, 06/25/07: Data-leak prevention companies Vericept, Reconnex release findings from separate surveys that support their product category.

From servers to storage: Virtualization saves

It's touted as one of the fastest and easiest ways to better manage and control your infrastructure. Download this guide today and see how network IT execs are making virtualization pay off in the real world; discover the 8 virtualization gotchas you need to know; and much more.
Click here to download.

Biometrics make user authentication convenient and secure – at the same time! 06/25/07: There’s usually an inverse relationship between enterprise security and end user convenience. When you tighten security, it often ...

PingID unveils online identity service, 06/25/07: PingID debuts personal identity management service built on support of OpenID and user-centric ID model.

Secret Service operations hit ID, credit card theft rings, 06/25/07: The U.S. Secret Service has cracked down on an international ID theft ring that is responsible for more than $14 million in fraud losses, the agency said Monday.

Sophos upgrades endpoint security suite, 06/25/07: Sophos upgrades its endpoint antivirus software with intrusion prevention features, control over unauthorized applications, and new management features.

Catbird brings security to VMware customers, 06/25/07: Catbird unveils V-Agent virtualization security product for VMware.

TODAY'S MOST-READ STORIES:

1. How MySpace is hurting your network
2. Lawyers show how to side-step immigration law
3. Gartner to IT: Avoid Apple's iPhone
4. Cisco moves reputation services into network devices
5. 10 automation companies to watch
6. NY college plans 11n WLAN rollout this summer
7. Pentagon shuts down systems after cyberattack
8. Microsoft, IBM feel heat from Google Apps
9. Why time stands still on the iPhone
10. The case of the 500-mile e-mail

MOST E-MAILED STORY:
Gartner to IT: Avoid Apple's iPhone


Contact the author:

Senior Editor Ellen Messmer covers security for Network World. E-mail Ellen.



BONUS FEATURE

IT PRODUCT RESEARCH AT YOUR FINGERTIPS

Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details.


PRINT SUBSCRIPTIONS AVAILABLE
You've got the technology snapshot of your choice delivered to your inbox each day. Extend your knowledge with a print subscription to the Network World newsweekly, Apply here today.

International subscribers, click here.


SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription.


Advertising information: Write to Associate Publisher Online Susan Cardoza

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772

Copyright Network World, Inc., 2007

No comments:

Post a Comment