Browsers get hacked before phones at security show Mobile devices took the spotlight at the CanSecWest security conference Wednesday, but it was browser bugs that got all the attention at the show's popular hacking contest. FTC urged to investigate security of Google services An online privacy group is calling on the U.S. Federal Trade Commission to investigate whether Google is making deceptive claims over the security of data stored in cloud-computing services such as Gmail and Google Docs. IT contractor indicted for sabotaging computer system An IT contract employee who formerly worked at an oil and gas production company in Long Beach, Calif., was indicted Tuesday on charges of sabotaging a computer system he helped set up because the company did not offer him a permanent job. Microsoft releases IE8, stresses security Microsoft plans to make its Internet Explorer 8 browser available on Thursday, along with a company-commissioned report claiming IE8 is more secure against malware than rival browsers from Mozilla and Google. LinkedIn Privacy Settings: What You Need to Know Since LinkedIn doesn't require you to share the same types of personal information as you do on Facebook, the service's privacy settings appear to be much more straightforward than its less business-oriented competitor. But if you leave the default settings in place, you might be surprised to know what information you make public on LinkedIn. FishNet joins with Optenet for SaaS security Two security vendors have joined forces to offer a 'comprehensive' Security-as-a-Service offering for enterprises struggling to deal with the growing complexity of security threats, coupled with the fiscal pressures associated with the current economic downturn. Auditor: U.S. SEC needs to improve cybersecurity The U.S. Securities and Exchange Commission (SEC) has taken steps to improve its information security, but it still hasn't corrected several vulnerabilities found in February 2008, according to an auditor's report. A Real Dumpster Dive: Bank Tosses Personal Data, Checks Data protection is not just an IT security issue. But security industry analyst Steve Hunt, who heads up Hunt Business Intelligence, believes too many people in IT security still have that false perception. Recover Your Laptop From Theft or Loss Let's talk about how you can protect your laptop when you travel...I have had my laptop stolen once, about four years ago, from the trunk of a locked car parked at a shopping mall. You never forget that experience of being violated, of being stupid. Security management: 3 key considerations What should you ask when buying security information management software? Enter for a Microsoft training giveaway from New Horizons New Horizons Computer Training is offering a free Microsoft training course worth up to $2,500 to be given to one lucky Microsoft Subnet reader. Deadline for entry is March 31. Network World on Twitter Get our tweets and stay plugged in to networking news. |
No comments:
Post a Comment