Monday, May 04, 2009

LexisNexis says its data was used by fraudsters; Cybersecurity incentives, not mandates, needed

LexisNexis started warning about 32,000 people that 'a few' customers used its service to illegally obtain credit cards
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Citrix
rule

Citrix Integrated Web Application Security
With application layer attacks on the rise, the need for a comprehensive security solution has never been greater. Benefit from Citrix NetScaler, a single, integrated appliance to accelerate Web applications, improve availability and enhance web app security.

rule

Spotlight Story
LexisNexis says its data was used by fraudsters

Robert McMillan By Robert McMillan
LexisNexis acknowledged Friday that criminals used its information retrieval service for more than three years to gather data that was used to commit credit card fraud. Read full story

Related News:

Expert: Cybersecurity incentives, not mandates, needed The U.S. Congress should look to provide incentives for private businesses to adopt stronger cybersecurity practices instead of creating new mandates, one information security expert told a congressional subcommittee Friday.

Facebook targeted by fresh round of phishing A number of phishing attacks that have struck Facebook users in the past two days have put the social networking site and its users on the defense.

Two brothers among indictees in $4M spam case Two Missouri men who made over $4 million pitching and selling everything from electronics to teeth whiteners to students in more than 2000 colleges and universities have been indicted by a federal grand jury on a variety of e-mail spamming and related charges.

Adobe promises fixes for latest flaws by next week Adobe Systems expects to have patches ready to fix the latest flaws in Acrobat and Reader by next week.

Spammers pin campaign on swine flu Swine flu spam is spreading like a virus of its own and recently turned malicious.

HP ProCurve gets into security with new server blade HP ProCurve is adding a security blade to edge and core switches that enables businesses to insert firewalls, VPNs and IDS/IPSs wherever they have one of the switches.

NAC software eases access rights assignments Avenda Systems is announcing support for MAC OS X devices in its NAC gear that makes it possible to run MAC health checks as part of a Microsoft network access protection (NAP) deployment.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Evolution of Ethernet
Evolution of Ethernet From 3Mbps over shared coax to 40/100Gbps over fiber…and beyond.

Apple iPhoneys: The 4G edition
Apple iPhoneys: The 4G editioniPhone enthusiasts from around the Web offer their visions for the next-gen iPhone.

Sponsored by Citrix
rule

Citrix Integrated Web Application Security
With application layer attacks on the rise, the need for a comprehensive security solution has never been greater. Benefit from Citrix NetScaler, a single, integrated appliance to accelerate Web applications, improve availability and enhance web app security.

rule

EMA: Refining privilege access security.
Close the security gaps in high-privilege access control and authentication by selecting the right security products for the job. This whitepaper, "Resolving the Privilege Management Paradox," details how. EMA outlines how to find products that offer strong shared access management, better control and clear visibility and multifactor authentication.
Click to download.


DNS news and tips
DNS is not secure and is extremely vulnerable. DNS is at the core of every connection we make on the Internet. While some servers are indeed vulnerable, because of inadequate management or knowledge, the real threat is from the protocol itself and how data is easily subverted or faked as it moves around the internet.
Receive the latest DNS news and tips

 

05/04/09

Today's most-read stories:

  1. New HP Networking boss took $17.2 million from EMC
  2. LaserJet turns 25 ... 'PC Load Letter' still unfathomable
  3. Is it time to cut the Ethernet access cable?
  4. Hacker: I broke into Twitter
  5. Some IT skills see pay hikes during downturn
  6. What kind of data center can you build with $500 million?
  7. 20 kick-ass network research projects
  8. Microsoft gives users Windows 7 free for 13 months
  9. Who's on deck to replace Cisco's Chambers?
  10. It takes a village idiot: The jerks of online forums
  11. Notebook replaces trackpad with LCD panel


Network World on Twitter: Get our tweets and stay plugged in to networking news


Metzler: 2009 Handbook of Application Delivery
Successful IT organizations must know how to make the right application delivery decisions in these tough economic times. This handbook authored by WAN expert Jim Metzler will help guide you.
Download now



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment