Monday, May 18, 2009

Corporate-espionage, e-mail break-in case zaps electronics industry

Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by EMC
rule

EMC's CSO Explains the Triple A's of Security Mgmt.
Roland Cloutier, EMC's Chief Security Officer shares his secrets for managing Authentication, Audit, Availability and security of the IT network infrastructure. Join us on Wednesday, June 3 at 2:00 p.m. ET/11:00 a.m. PT to find out how. Register for this Live Webcast now.

rule

Spotlight Story
Corporate-espionage, e-mail break-in case zaps electronics industry

Ellen Messmer By Ellen Messmer
The corporate-espionage case of David Goldenberg, former executive with AMX Corp., is rocking the world of high-end office and consumer electronics systems where Goldenberg, who broke into Sapphire marketing's e-mail systems to steal information about competitor Creston Electronics, all knew each other well. Read full story

Related News:

Who will check the security of cloud providers?
The most basic facts about your data – like where it is exactly and how it is replicated – become difficult to find out when you entrust it to a cloud, a new study says. While that’s not surprising, the implications are large, according to the Forrester Research report “How Secure is Your Cloud?” by analyst Chenxi Wang.

Is the U.S. ready for government-sponsored cyberattacks?
If there’s a sudden cyberattack on the U.S. Navy, Jim Granger could be among the first to know since it’s his job to keep watch. “We monitor the Navy’s grid,” says Granger, who is director of capabilities and readiness at the Navy Cyber Defense Operations Command in Norfolk, Va., home to the Naval Network Warfare Command. Granger works with a team of cyber-defense operations specialists in a security operations center, hunkered down behind computers to keep an eye on networks the Navy uses -- such as the Navy-Marine Corps Intranet -- both on land and at sea.

NSF wants $7B to head off demise of Moore's law, fund cybersecurity research and more
The National Science Foundation is looking to spend a good chunk of its proposed $7.045 billion budget for FY 2010 on advanced network technologies. The overall budget would be an 8.5% increase over FY 2009’s and would include $1.1 billion on Networking and Information Technology R&D.

FTC targets massive car warranty robocall scheme
Robocalls are a scourge and the Federal Trade Commission today took action against them by asking a federal court to shut down companies that have been bombarding consumers with hundreds of millions of allegedly deceptive robocalls in an effort to sell vehicle service contracts.


Evolution of Ethernet
Evolution of Ethernet From 3Mbps over shared coax to 40/100Gbps over fiber…and beyond.

Apple iPhoneys: The 4G edition
Apple iPhoneys: The 4G editioniPhone enthusiasts from around the Web offer their visions for the next-gen iPhone.

Sponsored by EMC
rule

EMC's CSO Explains the Triple A's of Security Mgmt.
Roland Cloutier, EMC's Chief Security Officer shares his secrets for managing Authentication, Audit, Availability and security of the IT network infrastructure. Join us on Wednesday, June 3 at 2:00 p.m. ET/11:00 a.m. PT to find out how. Register for this Live Webcast now.

rule

EMA: Refining privilege access security.
Close the security gaps in high-privilege access control and authentication by selecting the right security products for the job. This whitepaper, "Resolving the Privilege Management Paradox," details how. EMA outlines how to find products that offer strong shared access management, better control and clear visibility and multifactor authentication.
Click to download.


DNS news and tips
DNS is not secure and is extremely vulnerable. DNS is at the core of every connection we make on the Internet. While some servers are indeed vulnerable, because of inadequate management or knowledge, the real threat is from the protocol itself and how data is easily subverted or faked as it moves around the internet.
Receive the latest DNS news and tips

 

05/18/09

Today's most-read stories:

  1. Verizon shows off new rolling command center
  2. Microsoft's software pipeline set to burst
  3. Google ran out of bandwidth?
  4. Web-hosting firms defy recession
  5. Where the IT jobs are: 10 American cities
  6. Microsoft IT goes live with its Geneva identity platform
  7. Google suffers major failure
  8. Nortel is certainly taking its time
  9. Rackable Systems becomes SGI, closes deal
  10. Poster on Chinese forum leaks next-gen iPhone specs


Network World on Twitter: Get our tweets and stay plugged in to networking news


Metzler: 2009 Handbook of Application Delivery
Successful IT organizations must know how to make the right application delivery decisions in these tough economic times. This handbook authored by WAN expert Jim Metzler will help guide you.
Download now



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment