Wednesday, July 29, 2009

10 ways your voice and data can be spied on

U.S. Air Force foretells drone that can make attack decisions on its own; New initiative is looking for a few good cybersecurity pros
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile


Sponsored by Cisco
rule

Cost-Effectively Network Bolster Security
The corporate perimeter is eroding and threats are increasingly difficult to detect and mitigate. Ensure your network is protected. Learn how to build a self-defending network that incorporates innovative application and content security, monitoring technologies and policy enforcement.

rule

Spotlight Story
10 ways your voice and data can be spied on

Attackers seeking to do harm or mischief to networks work with an ever expanding arsenal of tools that sometimes seem to be the stuff of spy fiction, but they are all too real. Read full story

Related News:

U.S. Air Force foretells drone that can make attack decisions on its own
By 2047 the Air Force says unmanned aircraft with blazing artificial intelligence systems could fly over a target and determine whether or not to unleash lethal weapons – without human intervention.

New initiative is looking for a few good cybersecurity pros
Amid concerns that the U.S. has a shortage of cybersecurity professionals, a new consortium of U.S. government and private organizations aims to identify students with strong computer skills and train them as cybersecurity guardians, warriors and "top guns."

Low-tech Internet scams net big money
Domino's Pizza lost about $77,000 in free pizza due to a weak password on an online promotion that wasn't supposed to go live -- a type of security problem that is all too common, according to a presentation slated for the Black Hat USA conference this week.

AT&T's 4chan Block Raises Issue of Net Neutrality
It appears some of AT&T's broadband customers across the United States were intentionally blocked from accessing the infamous forum 4chan over the weekend. The message board's founder Christopher "Moot" Poole posted a notice on the 4chan Status blog yesterday claiming AT&T was "filtering/blocking img.4chan.org (/b/ & /r9k/) for many of [its] customers." Poole encouraged 4chan users to contact AT&T to complain. The 4chan black out lasted for about 12 hours and was reportedly over by 11 p.m. Pacific Time.

Symantec program sends security analysts to customer sites
The Cyber Threat Analysis Program places Symantec analysts within an enterprise to analyze and mitigate security threats.

July Giveaways
Cisco Subnet is giving away 15 copies each of books on Enterprise Web 2.0 and Building a Greener Data Center; Microsoft Subnet is giving away training from New Horizons to one lucky reader and 15 copies of Microsoft SQL Server 2008 Reporting Services Unleashed. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages. Deadline for entries July 31.

Network World on Twitter? You bet we are


Botnet boom
BotnetsThe number of botnets has grown from about 1,500 two years ago to 3,500 today.

Watch this space
IT quizHere are 11 security companies to watch.

Beyond ROI Calculators: Real-World Security Savings
See how WatchGuard's security solutions could have saved two organizations millions if in place prior to the headline-making cyber attacks both experienced. These solutions could have mitigated or prevented the breaches entirely. Get the facts and realize how to effectively address your real-world security problems today.
Learn more now.


 

July 29, 2009

TOP STORIES | MOST DUGG STORIES

  1. Five technologies Iran is using to censor the Web
  2. America's 10 most wanted botnets
  3. EC decision expected to force IE to better support standards
  4. 10 cutting edge spy gadgets
  5. Better Apple rumor: $800 tablet by Christmas, really
  6. Microsoft to rush out emergency IE patch
  7. Ericsson wins auction to buy Nortel wireless business
  8. Best data loss prevention tools
  9. Tech tattoos: The good, the bad and the RU SRS?!
  10. Network Solutions warns merchants after hack

Meeting PCI and Securing the Data Center
Discover the risks improperly implementing PCI DSS configuration controls and change processes present to the cardholding environment and how configuration assessment and file integrity monitoring can mitigate them.
Learn more now.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



1 comment:

  1. Anonymous11:36 PM

    Affiliate Marketing is a performance based sales technique used by companies to expand their reach into the internet at low costs. This commission based program allows affiliate marketers to place ads on their websites or other advertising efforts such as email distribution in exchange for payment of a small commission when a sale results.

    www.onlineuniversalwork.com

    ReplyDelete