An Amazing Laptop Recovery Story This is a true story about sex, computers, the Internet, spying, theft, intrigue, and the police--and it all began this past February when David Krop made the mistake of leaving his two laptop computers inside a locked SUV in a parking garage. Fed cloud plan is wisely tempered by security concerns The federal CIO is pushing for government use of cloud services immediately, and the way he is going about it can teach a lesson to businesses struggling with how to use these services securely. Google ReCAPTCHA acquisition latest in long line of buyouts In light of Google's buyout this week of Carnegie Mellon University spinoff ReCAPTCHA, it seems like a good time to take a spin back through Google's more notable buyouts over the years. Wikipedia lists 55 of them, and given Google's sometimes mysterious ways, there are no doubt a few that didn't make the public list. Security disaster averted by financial firm's quick actions While most of the IT world has been spared a devasting security attack like Blaster and Sasser for the last few years, the damage wrought by all manner lesser-known computer viruses continues to inflict corporate pain. Spam, malware dominate online user comments, Websense reports A staggering 95% of all "user-generated comments" for blogs, chat rooms and message boards online are spam or malicious, according to a new Websense report on security threat trends. New phishing attack chats up victims With many who bank online now wary of phishing attacks, criminals are adding fake live-chat support windows to their Web sites to make them seem more real. Attack E-mails Use Fake Shipping Confirmation Ruse A triple-payload e-mail attack that uses a fake shipping confirmation notice with a supposed attached label is making the rounds, according to Webroot. Microsoft Subnet is giving away training from New Horizons and 15 copies of Windows Server 2008 How-To. Cisco Subnet is giving away 15 copies of Interconnecting Data Centers Using VPLS. Google Subnet is hosting many new bloggers (watch for giveaway information soon.) Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages. Network World on Twitter? You bet we are |
No comments:
Post a Comment