Search This Blog

Tuesday, June 09, 2009

2009 Top Urban Legends in IT Security

Social Engineering: 5 Security Holes at the Office; T-Mobile net reportedly hit by hacker/extortion attack
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile


Sponsored by Belden
rule

Wired + Wireless: Smart Planning for New Network Infrastructures
Important considerations are needed in planning combined wired and wireless networks to optimize performance and reduce costs. When installing or upgrading a structured cabling plant, IT departments can achieve significant time and money savings by determining and integrating their Wireless LAN (WLAN) requirements right from the start.

rule

Spotlight Story
2009 Top Urban Legends in IT Security

There are lots of IT Security related urban legends floating around the Internet. Some have malicious intent and others are just for fun. Some have been with us for years but still refuse to die. Here is a list of my top IT Security Urban Legend picks for this year. 1) Department of Homeland Security mandates that all PC manufacturers install keyboard-logging devices in all PC keyboards. Read full story

Related News:

10 things you didn't know about cyberwarfare
Imagine a situation where a powerful country wants to annex its small neighbor, so it launches a week-long campaign of cyberattacks aimed at disrupting the financial, energy, telecom and media systems of its neighbor's biggest ally. A week later, the aggressor launches a full-scale cyberwar on its neighbor that includes air and naval defenses. With its ally's defenses weakened, the neighbor agrees to become a province of the aggressor in less than a week.

Social Engineering: 5 Security Holes at the Office
If you think the biggest threat to your sensitive information lies in network security, think again. Once a criminal is inside a building, there are limitless possibilities to what that person can access or damage. Take a look at your building's security. How easy is it to get inside?

T-Mobile net reportedly hit by hacker/extortion attack
T-mobile customers are awakening this morning to reports that hacker/extortionists have victimized the cellular carrier through a massive network breach resulting in the theft of untold amounts of corporate and customer data, which they're threatening to sell to the highest bidder. T-Mobile says it is investigating. There is also speculation among observers online that the incident, which became public Saturday, could be a hoax.

June Giveaways

Cisco Subnet and Microsoft Subnet are giving away training from Global Knowledge to two lucky readers and 15 copies each of books on IPv6 security, the Cisco Secure Firewall Services Module, and Active Directory Domain Services 2008. Deadline for entries June 30.


Windows 7 + Windows Server 2008
Evolution of EthernetWe found 5 things to love and 5 things to hate about Microsoft's latest operating system versions.

Open-source management
Apple iPhoneys: The 4G editionHere are nine management apps that won't break the bank.

Go Green Enterprise-Wide: It Power Management Strategies that Save
Successful power management policies deployed at enterprise scale promise numerous benefits including: Power cost savings, Environmental dividends, Rebates as well as Integration opportunities. Discover the building blocks of a successful IT Power Management policy and how this policy can align with your business's green initiatives.
Read More Now


 

June 09, 2009

TOP STORIES | MOST DUGG STORIES

  1. New DOS attacks threaten wireless data networks
  2. 2009's summer smartphone blockbusters
  3. Cisco's take on 4G: It's all about video
  4. Juniper claims first with 100G Ethernet
  5. CIOs: Your networks have already been compromised
  6. T-Mobile net reportedly hit by hacker/extortion attack
  7. Bing vs. Google vs. Yahoo: Feature smackdown
  8. FTC shuts down notorious ISP
  9. Five things we love/hate about Win 7/Windows Server 2008 R2
  10. Nvidia overcomes bad graphics chips

An Executive's Guide to Web Application Security
Companies have relied on perimeter defenses to keep their networks and data secure. Unfortunately, network firewalls and network vulnerability scanners can't defend against application-level attacks. Therefore, it's more important than ever to examine your Web application security, assess your vulnerability and take action to protect your business.
Read More



Inbox too cluttered?
Take our survey to help us improve how IT professionals get the information they need.
Click to take our survey


IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: