Friday, January 30, 2009

Ex-Fannie Mae employees plant computer-time bomb; Worm floats Obama's head on your desktop

With economic slump, concerns rise over data theft
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Oracle
rule

Successfully Manage a Secure Database.
Database professionals are invited to join this Oracle Live Webcast on Thursday, February 5 at 2:00 p.m. ET/11:00 a.m. PT. Gain a better understanding of database security and how to more strategically work with security administrators. Don't miss out. Register for this live webcast now

rule

Spotlight Story
Ex-Fannie Mae employee accused of planting computer time bomb

Ellen Messmer By Ellen Messmer
Ex-Fannie Mae computer engineer is charged in setting computer time bomb, according to published reports. Read full story

Related News:

Worm floats Obama's head on your desktop The odds are pretty good that this will never happen to you, but should a floating head of U.S. President Barack Obama pop up on your desktop Monday morning, know this: You've been hit with the Obama worm.

With economic slump, concerns rise over data theft Is the worsening economic situation going to turn some employees into data thieves?
Related podcasts:
5 Ways Employees Can Sabotage Your Network
Protecting against insider threats in a down economy
Who's Stealing Your Data?

Data export leaves firms vulnerable, says research The tendency of firms to distribute sensitive data to offices around the globe could be creating a new form of information vulnerability, a report has suggested.

What New Air Cargo Security Rules Mean for Business February will mark the start of new guidelines for air cargo. A congressional mandate issued in 2007 requires the Transportation Security Administration to screen 50% of all cargo on board passenger aircraft. The mandate goes further to require 100% inspection by August 2010.

Third U.S. gov't worker pleads to passport snooping A third U.S. State Department employee has pleaded guilty to illegally accessing dozens of confidential passport application files, the U.S. Department of Justice said.

Information security and the outsider, Part 1 In a world of new, unconventional military conflict around the globe, one of the largest producers of secure information, the U.S. government, has had to create non-traditional partnerships to help accomplish domestic missions. In this two-part series, guest writer Lt. Col. Robert E. Jennings, vice commander of the New Jersey Wing of the Civil Air Patrol and a leader of the service delivery managers in Dell's ProSupport organization, looks at how the government is working with semi-official volunteer organizations. In part 2, he provides a case study of how one of those organizations adapted to provide better information security for their new assignments.

Information security and the outsider, Part 2 Lt. Col. Robert E. Jennings is back with a look at how Civil Air Patrol, the all-volunteer, civilian auxiliary of the U.S. Air Force, introduced more rigorous information security practices to better serve new domestic missions from the government.

Who goes there? Identity management is all about who you are and what you should be allowed to do. This Product Guide describes the technology and how it works.

January giveaways from Cisco Subnet and Microsoft Subnet
Up for grabs: Two Cisco training courses from Skyline-ATS worth up to $6,990, a Microsoft training course from New Horizons worth up to $2,500, 15 copies each of the hot book titles Microsoft SQL Server 2008 Management and Administration, IPv6 Security and Chained Exploits: Advanced Hacking Attacks. Get all the entry details here.


Betting on SuperNAP
In Las Vegas, data center takes power and cooling to the limitIn Las Vegas, data center takes power and cooling to the limit.

Data gone missing
10 woeful tales of data gone missing10 woeful tales involving backup tapes: some current, some classic and one just plain unusual.

Sponsored by Oracle
rule

Successfully Manage a Secure Database.
Database professionals are invited to join this Oracle Live Webcast on Thursday, February 5 at 2:00 p.m. ET/11:00 a.m. PT. Gain a better understanding of database security and how to more strategically work with security administrators. Don't miss out. Register for this live webcast now

rule

HP Logical Servers
Make your datacenter infrastructure more adaptive with logical server technology. Find out how you can simplify routine tasks and create more efficiency within your datacenter.
Learn more


Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe in this Executive Guide. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies explained in this report.
Download this Executive Guide now.

 

01/30/09

Today's most-read stories:

  1. Google M-Lab provides a window into your ISP
  2. Don't fear the penguin: A newbie's guide to Linux
  3. Laid-off Nortel workers lobby for severance
  4. Online privacy tips for teens . . . and the adults who ignore them
  5. World's first 2Tb drive launched in Australia
  6. New Data Center: storage
  7. Tech industry's most famous Super Bowl ads
  8. Fallout 3: Operation Anchorage DLC now available
  9. Ex-Fannie Mae employee accused of planting computer time bomb
  10. FTC slaps Do Not Call violators with $1.2 million in penalties


The Evolution of Network Security
Zero in on the hottest security technologies you need to know about in this Executive Guide. Better protect your IT environment with NAC, data leakage prevention controls and auditing tools.
Learn more.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment