Network World on Twitter Get our tweets and stay plugged in to networking news. Study: Hackers still enjoy vandalizing Web sites A study of 57 Web site hacks from last year showed that 24% were aimed at defacing a site rather than financial gain. Commerce chief faces 5 Internet emergencies If former Washington State Gov. Gary Locke (D) is confirmed as the new U.S. Commerce Secretary, he'll face several Internet policy issues that require immediate attention and decisive action in 2009. Scammers abuse Google Trends to poison search results Cyber crooks are using one of Google's own tools to poison search results with links that spread fake security software, a researcher said Thursday. MessageLabs: Spammers pull at the heart in February The start of February saw Internet spam levels rise to as high as 79.5% of all e-mails due to a spike in botnet activity and spammers leveraging the financial crisis and Valentine's Day, according to MessageLabs. Identity theft morphs, but maintains lead as FTC's top consumer complaint For the ninth year in a row identity theft - particularly in Arizona and California - was the number one consumer complaint filed with the Federal Trade Commission in 2008. Of 1,223,370 complaints received in 2008, 313,982 - or 26% - were related to identity theft. FCC threatens fines on data protection rules The U.S. Federal Communications Commission may fine 600 operators for failing to properly file annual reports proving that they protect customer data. SEC, FTC investigating Heartland after data theft Federal agencies, including the U.S. Federal Trade Commission and the U.S. Securities and Exchange Commission, have begun investigating Heartland Payment Systems following a massive data breach at the payment processing company. How to Achieve More 'Agile' Application Security Application security has become a critical component of all software development efforts. It includes all measures taken throughout the software development lifecycle to prevent programming flaws from being exploited. The flaws that creep in during the requirements, design, development, deployment, upgrades, or maintenance stages of applications become the basis of cyber attacks. Report cites potential privacy gotchas in cloud computing Companies looking to reduce their IT costs and complexity by tapping into cloud computing services should first make sure that they won't be stepping on any privacy land mines in the process, according to a report released this week by the World Privacy Forum. Compliance Complaints IDC, a sister company to CSO, predicts that IT security spending will still grow by nearly 10 percent in 2009, and even faster in 2010. They characterize security as "the least likely area [in IT] to face cuts in response to the current economic crisis. U.K. declines to prosecute hacker wanted in U.S. British authorities said Thursday they won't prosecute a hacker who would prefer to face trial in his own country rather than face extradition to the U.S. February giveaways from Cisco Subnet and Microsoft Subnet Up for grabs: One American Express gift card worth $250 from Global Knowledge; One Microsoft training course worth $2,995 from Global Knowledge; 15 copies each of the hot book titles Voice over IP Security, and CCNA Wireless Official Exam Certification Guide and 15 copies of Exchange Server 2007 How-To: Real Solutions for Exchange Server 2007 SP1 Administrators. Get all the entry details here. |
No comments:
Post a Comment