Thursday, August 27, 2009

States, school districts trying to get ahead of sexting craziness; rojan attacks up, phishing attacks down this year, IBM finds

States, school districts trying to get ahead of sexting craziness; Trojan attacks up, phishing attacks down this year, IBM finds
Network World logo

Security Strategies Alert

NetworkWorld.com | Update Your Profile


Sponsored by Tripwire
rule

CCM for IT Compliance and Risk Management
Learn from industry analysts how IT organizations are using configuration management to meet compliance requirements and instill best practices. Find out how these organizations are applying the resulting processes to enhance security and improve operational efficiency in order to increase their level of service delivery.

Click here.

rule

Spotlight Story
Identity theft resource center

Identity theft (IDT) continues to grow in the US and the world as electronic personally identifiable information (PII) about all of us increases in volume and dispersion. The Identity Theft Resource Center® (ITRC) provides excellent resources to help information assurance (IA) professionals and the public keep informed about current IDT developments and countermeasures. Read full story

Related News:

States, school districts trying to get ahead of sexting craziness
One of the biggest school districts in the country is trying to squelch the rampant scourge of sexting or the practice of sending nude or semi-nude photos by cell phone. In Houston, the school district this week adopted a no "sexting" rule that states distribution of nude or semi-nude photographs or videos by text message will not be tolerated.

Trojan attacks up, phishing attacks down this year, IBM finds
Spam-based phishing attacks declined noticeably during the first half of the year, but cyber-criminals may simply be shifting to other technologies found to be more effective in stealing personal data, according to IBM in its semi-annual security threat report .

Symantec offers fix for buggy Norton patch
Symantec has posted a software fix after hundreds of users reported problems with a buggy update of the company's flagship Norton AntiVirus software.

Cisco wireless LAN vulnerability could open 'back door'
Some wireless access points from Cisco Systems have a vulnerability that could allow a hacker to redirect traffic outside the enterprise or potentially gain access to an entire corporate network, a security company said.

Personal spy gear: Is it ethical? Is it legal?
From disguised video security cams to GPS tracking loggers, personal security is going high-tech. But these gadgets bring up a host of sticky ethical and legal questions.

How to minimize the risk of illicit credit card capturing
Illegally capturing customer payment card numbers, or skimming, is a huge threat to merchants, according to an upcoming report on the criminal activity.

August Giveaways
Cisco Subnet is giving away training from Global Knowledge and 15 copies of Practical Intrusion Analysis; Microsoft Subnet is giving away training from Global Knowledge and 15 copies of SCCM 2007 Unleashed. Google Subnet is giving away 15 copies of Web Geek's Guide to Google Chrome. Entry forms can be found on the Cisco Subnet, Microsoft Subnet and Google Subnet home pages. Deadline for entries is August 31.

Network World on Twitter? You bet we are


10 sports technologies to love, 5 to hate
Sports technologiesMany technologies help fans enjoy sports. Others just annoy.

Apple disasters
Apple disastersApple has enjoyed huge success with the iPod and iPhone, but Apple has had a number of commercial flops, too.

Avoiding Security Breaches
Discover effective tools and strategies for gaining regulatory compliance, avoiding security breaches and enforcing tight security. Learn how to recover from a data breach, the latest in security best practices, how you can achieve compliance while saving money, and more.
Click here.


Sophos Security Solution Center
With the threat landscape constantly changing, you need to have comprehensive protection that isn't complicated. With Sophos, you get complete protection for less investment. You get best-in-class threat protection, and data security and compliance that are simple and affordable so you can get more out of your existing security budget. Review timely resources at this Solution Center.
Visit this site today!

 

August 27, 2009

TOP STORIES | MOST DUGG STORIES

  1. The opposite of Twitter
  2. 12 words you can never say in the office
  3. Judge overturns 2007 Unix copyright decision
  4. Cisco Wi-Fi vulnerability could open 'back door'
  5. Microsoft, Citrix no longer sponsoring VMworld
  6. Air Force, NASA fire environmentally friendly rocket
  7. Personal spy gear: Is it ethical? Legal?
  8. Obsolete technology: 40 big losers
  9. Is Cisco ACS 5.0 worth the upgrade?
  10. Back-to-school quiz for techies

IBM ISS X-Force Threat and Risk Report
Read this Trend and Risk report from IBM® ISS X-Force® to learn statistical information about all aspects of threats that affect Internet security, including software vulnerabilities and public exploitation, malware, spam, phishing, web-based threats, and general cyber criminal activity.
Read Now



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment