Monday, August 31, 2009

China game boss sniped rivals, took down Internet; FTC rules outlawing those damned annoying robocalls hit Sept. 1

China game boss sniped rivals, took down Internet; FTC rules outlawing those damned annoying robocalls hit Sept. 1
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile


Sponsored by Juniper Networks
rule

Live Webcast: The Benefits of Integrated IPS
Application security and network visibility across your entire network is a reality with an integrated Intrusion Prevention System. Register now for this Live Webcast scheduled for Thursday, September 17, 1:00 p.m. EST/10 a.m. PST. Industry experts will explain how you can easily integrate IPS into an existing network in a manageable, cost-effective way. Get the security threat response your organization requires without suffering from information overload.

Register now.

rule

Spotlight Story
Security test prompts federal fraud alert

A sanctioned security test of a bank's computer systems had some unexpected consequences this week, leading the federal agency that oversees U.S. credit unions to issue a fraud alert. Read full story

Related News:

China game boss sniped rivals, took down Internet
An attack by a Chinese online game provider meant to cripple the servers of its rivals ballooned to cause an Internet outage in much of the country in May, according to police.

FTC rules outlawing those damned annoying robocalls hit Sept. 1
Nearly a year after announcing the plan, new Federal Trade Commission rules prohibiting most robocalls are set to take effect Tuesday, Sept. 1.

Researcher plots downfall of GSM phone security
A US-based researcher has published a new method of attacking the encryption used to secure GSM mobile phones that he believes will force networks to revise the current generation of call security.

Snow Leopard's old and new annoyances
Almost a year ago, I shared my list of ten things I found annoying about Leopard. With the release of Snow Leopard, I thought I'd take a look at the new OS to see whether or not it fixes them. At the same time, I kept an eye out for new glitches.

U.K. launches privacy initiative
Recently I've been talking about identity-related initiatives from both the U.S. and Canadian governments. There was even a mention of some privacy issues raised by the Canadians. So as not to be overlooked, today I want to mention a new privacy initiative from the U.K. government.

FBI investigating laptops sent to U.S. governors
The U.S. Federal Bureau of Investigation is trying to figure out who is sending laptop computers to state governors across the U.S., including West Virginia Governor Joe Mahchin and Wyoming Governor Dave Freudenthal. Some state officials are worried that they may contain malicious software.

Court ruling limits electronic searches
A federal appeals court this week ruled that government investigators cannot retain incriminating information found in electronic searches unless it is within the scope of a search warrant.

Pentagon reviews Stealth encryption prototype
The Stealth encryption prototype from Unisys has been accepted by the Pentagon for review in a technical-evaluation program as a required first step that could, if successful, make Stealth a candidate for future use in secure IP-based communications across the military.

August Giveaways
Cisco Subnet is giving away training from Global Knowledge and 15 copies of Practical Intrusion Analysis; Microsoft Subnet is giving away training from Global Knowledge and 15 copies of SCCM 2007 Unleashed. Google Subnet is giving away 15 copies of Web Geek's Guide to Google Chrome. Entry forms can be found on the Cisco Subnet, Microsoft Subnet and Google Subnet home pages. Deadline for entries is August 31.

Network World on Twitter? You bet we are


10 sports technologies to love, 5 to hate
Sports technologiesMany technologies help fans enjoy sports. Others just annoy.

Apple disasters
Apple disastersApple has enjoyed huge success with the iPod and iPhone, but Apple has had a number of commercial flops, too.

IBM ISS X-Force Threat and Risk Report
Read this Trend and Risk report from IBM® ISS X-Force® to learn statistical information about all aspects of threats that affect Internet security, including software vulnerabilities and public exploitation, malware, spam, phishing, web-based threats, and general cyber criminal activity.
Read Now


Sophos Security Solution Center
With the threat landscape constantly changing, you need to have comprehensive protection that isn't complicated. With Sophos, you get complete protection for less investment. You get best-in-class threat protection, and data security and compliance that are simple and affordable so you can get more out of your existing security budget. Review timely resources at this Solution Center.
Visit this site today!

 

August 31, 2009

TOP STORIES | MOST DUGG STORIES

  1. Wi-Fi encryption cracked in 60 seconds
  2. 12 words you can never say in the office
  3. Robocalls outlawed as of Sept. 1
  4. 5 techs that could reinvent cell phones
  5. The opposite of Twitter
  6. High-tech blimps earning their wings
  7. Obsolete technology: 40 losers
  8. Worst co-workers ever
  9. Free tool brings analysis to Cisco ASA
  10. 2,200 broadband stimulus applications

Reporting for Profitability
Think beyond the current structure of a report and personalize it with Business Intelligence Reporting Tools (BIRT) Interactive Viewer. Meet data visualization requirements faster and with less development by making BIRT web output interactive.
Learn more.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment