Friday, May 01, 2009

Hacker: I broke into Twitter; RSA Conference roundup

Network security: What do Britney Spears, the Wizard of Oz and the Dark Market have in common?
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Oracle
rule

The Cost of Securing your Database
Security and regulatory compliance are not optional despite slashed IT budgets. Tune into this Webcast sponsored by Oracle to better understand the economics of IT security. Learn about the importance of database security in a cost-efficient IT security strategy. Learn more.

rule

Spotlight Story
Hacker: I broke into Twitter

Robert McMillan By Robert McMillan
For the second time this year, a hacker has gained administrative access to a Twitter employee's account. Read full story

Related News:

Editor's note: We will be changing how we send out Network World newsletters over the next few weeks. To ensure future delivery of your newsletters, please add nww_newsletters@newsletters.networkworld.com to your e-mail address book or
66.186.127.216 to your white-list file. Thank you.

Network security: What do Britney Spears, the Wizard of Oz and the Dark Market have in common? Last week’s RSA Conference in San Francisco was as intriguing as past years. In fact we’ve found that security experts can say the darndest things. Here are a few choice memories from the RSA Conference 2009:

U.S. needs transparent policies for carrying out cyberattacks The notion that the federal government needs to create an arsenal of cyberattack capabilities to help defend U.S. interests in cyberspace is gaining considerable support as...

From Computers to Crime Busting When a high-speed chase on an interstate highway in Alpharetta, Ga., resulted in the arrest of a suspect with seven felony warrants, residents credited the work of a fast-acting police officer. Little did they know that a mild-mannered CIO was also to thank for nabbing the dangerous offender.

Federal CISOs decry excessive paperwork Unnecessary paperwork and too much focus on compliance reporting are two of the biggest distractions for federal Chief Information Security Officers trying to shore up...

'Phantom' withdrawal case concludes in U.K. court A one-day trial that raises questions about the security of cash cards used in the U.K. and Europe concluded Thursday, with a decision expected in about a month.

Businesses losing fight against employee apps Enterprises are struggling to control the use of consumer applications within the workplace, despite the panoply of security tools being used within corporations.

F5 adds security touches to Big-IP F5 has added security enhancements to its Big-IP applications delivery platform. The company, which launched version 10 of the Big-IP software last month, held off on the security additions to the product.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Evolution of Ethernet
Evolution of Ethernet From 3Mbps over shared coax to 40/100Gbps over fiber…and beyond.

Apple iPhoneys: The 4G edition
Apple iPhoneys: The 4G editioniPhone enthusiasts from around the Web offer their visions for the next-gen iPhone.

Sponsored by Oracle
rule

The Cost of Securing your Database
Security and regulatory compliance are not optional despite slashed IT budgets. Tune into this Webcast sponsored by Oracle to better understand the economics of IT security. Learn about the importance of database security in a cost-efficient IT security strategy. Learn more.

rule

Cut Campus Network TCO by 50%.
Learn how to reduce your campus networks' TCO by up to 50% without compromising high performance, security or reliability. Juniper Networks shows you how to achieve unparalleled consistency, flexibility and efficiency for the lowest possible TCO.
Click here to register for this Live April 30 Webcast.


EMA: Refining privilege access security.
Close the security gaps in high-privilege access control and authentication by selecting the right security products for the job. This whitepaper, "Resolving the Privilege Management Paradox," details how. EMA outlines how to find products that offer strong shared access management, better control and clear visibility and multifactor authentication.
Click to download.

 

05/01/09

Today's most-read stories:

  1. What kind of data center can you build with $500 million?
  2. 10 tips for swine flu planning
  3. Microsoft gives server apps virtualization sneak peek
  4. It takes a village idiot: The jerks of online forums
  5. Locking out users gives attackers a tool for DoS
  6. Swine flu threat raises telework questions
  7. Watchdogs smack FCC over E-Rate
  8. Microsoft targets Windows, Linux management
  9. Revving up telework, Obama style
  10. Some IT skills see pay hikes during downturn
  11. Notebook replaces trackpad with LCD panel


Network World on Twitter: Get our tweets and stay plugged in to networking news


Metzler: 2009 Handbook of Application Delivery
Successful IT organizations must know how to make the right application delivery decisions in these tough economic times. This handbook authored by WAN expert Jim Metzler will help guide you.
Download now



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment