Wednesday, August 26, 2009

How to minimize the risk of illicit credit card capturing; Personal spy gear: Is it ethical? Is it legal?

How to minimize the risk of illicit credit card capturing; FTC whacks four more telemarketing scammers
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile


Sponsored by Diskeeper
rule

Free Disk Performance Analyzer for Networks
Find disk-related performance bottlenecks on your networked systems now! Disk Performance Analyzer for Networks is a FREE utility that remotely scans your systems and identifies systems with severe disk performance issues—so you can address them before they become help desk calls. Download this free utility now!

Click here

rule

Spotlight Story
Cisco wireless LAN vulnerability could open 'back door'

Some wireless access points from Cisco Systems have a vulnerability that could allow a hacker to redirect traffic outside the enterprise or potentially gain access to an entire corporate network, a security company said. Read full story

Related News:

How to minimize the risk of illicit credit card capturing
Illegally capturing customer payment card numbers, or skimming, is a huge threat to merchants, according to an upcoming report on the criminal activity.

FTC whacks four more telemarketing scammers
The Federal Trade Commission today settled charges with four telemarketing scammers who were charging for products that were never ordered, making bogus claims about their products, and harassing consumers with unwanted phone calls, the commission stated.

Personal spy gear: Is it ethical? Is it legal?
From disguised video security cams to GPS tracking loggers, personal security is going high-tech. But these gadgets bring up a host of sticky ethical and legal questions.

Bugs and Fixes: A Rare Emergency Fix From Microsoft
Microsoft might have been feeling like the little Dutch boy over the last month, plugging holes with regular patches and with rare out-of-cycle fixes in an attempt to prevent attackers from pouring through.

A skank discussion: Privacy, anonymity, and misogyny
In response to last week's post about former supermodel Liskula Cohen forcing Google to give up the identity of an anonymous blogger ("Skanks for nothing: Google must identify anonymous blogger"), I got a couple of e-mails that are worth exploring in a little more depth. So here goes.

A6 promises a way to check up on public cloud security
What cloud services users need is a way to verify that the security they expect is being delivered, and there is an effort underway for an interface that would do just that.

August Giveaways
Cisco Subnet is giving away training from Global Knowledge and 15 copies of Practical Intrusion Analysis; Microsoft Subnet is giving away training from Global Knowledge and 15 copies of SCCM 2007 Unleashed. Google Subnet is giving away 15 copies of Web Geek's Guide to Google Chrome. Entry forms can be found on the Cisco Subnet, Microsoft Subnet and Google Subnet home pages. Deadline for entries is August 31.

Network World on Twitter? You bet we are


10 sports technologies to love, 5 to hate
Sports technologiesMany technologies help fans enjoy sports. Others just annoy.

Apple disasters
Apple disastersApple has enjoyed huge success with the iPod and iPhone, but Apple has had a number of commercial flops, too.

Executive Guide: Next Gen Data Center
IT transformation begins at the data center, as enterprises embrace technologies such as virtualization and cloud computing to build adaptable, flexible and highly efficient infrastructures capable of handling today's business demands. Review this guide to see what's next for the Data Center.
Learn more.


Sophos Security Solution Center
With the threat landscape constantly changing, you need to have comprehensive protection that isn't complicated. With Sophos, you get complete protection for less investment. You get best-in-class threat protection, and data security and compliance that are simple and affordable so you can get more out of your existing security budget. Review timely resources at this Solution Center.
Visit this site today!

 

August 26, 2009

TOP STORIES | MOST DUGG STORIES

  1. 12 words you can never say in the office
  2. Air Force, NASA fire environmentally friendly rocket
  3. Judge overturns 2007 Unix copyright decision
  4. Where not to find an IT job
  5. Obsolete technology: 40 big losers
  6. How projects really work
  7. Scientists capture mysterious huge lightning flashes
  8. How to run your IT department into the ground
  9. New Data Center: Virtualization
  10. Cisco Wi-Fi vulnerability could open 'back door'

IDC ROI Calculator for IBM Tivoli Netcool
This ROI calculator from IDC will help you quickly and easily understand the average annual benefit that you may be able to achieve using IBM® Tivoli® Netcool®. The tool and underlying calculations and metrics are based on IDC research of 14 IBM Tivoli Netcool implementations.
Read Now



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment