What can be done to ensure online privacy? The Federal Trade Commission later this year is holding public roundtables to look at the privacy challenges posed by the vast array of technology and business practices including social networking, cloud computing, online behavioral advertising, mobile marketing, and the collection and use of information by retailers, data brokers, third-party applications. Quick actions help financial firm avoid security disaster While most of the IT world has been spared a devasting security attack like Blaster and Sasser for the last few years, the damage wrought by all manner lesser-known computer viruses continues to inflict corporate pain. Phishing attacks go down by 45 percent: Symantec Symantec observed a 45 per cent decrease from the previous month in all phishing attacks, according to its September State of Phishing report. Web server attacks, poor app patching make for lethal mix A dangerous combination of a massive increase in Web server attacks and poor patching practices is a major cause of concern for experts, according to a report issued today by several security organizations. Software helps robots make intelligent decisions In its quest for ever-smarter robots, military researchers this week gave a $850,000 grant robotics and automation vendor TRACLabs to build software that can help robots use their sensor systems more intelligently. Cloud security through control vs.ownership Cloud computing makes auditors cringe. It's something we hear consistently from enterprise customers: it was hard enough to make virtualization "palatable" to auditors; cloud is going to be even harder. By breaking the links between hardware and software, virtualization liberates workloads from the physical constraints of a single machine. Cloud takes that a step further making the physical location irrelevant and even obscure. Internet scammers leap on Patrick Swayze's death Malware ghouls took just a few hours to begin preying on the death of actor Patrick Swayze with a new version of a familiar phony anti-virus scam. The other iPhone lie: VPN policy support The iPhone OS 3.1 fixed false reporting about Exchange policy adherence. It turns out that a similar flaw existed for VPN policies, too Microsoft Subnet is giving away training from New Horizons and 15 copies of Windows Server 2008 How-To. Cisco Subnet is giving away 15 copies of Interconnecting Data Centers Using VPLS. Google Subnet is hosting many new bloggers (watch for giveaway information soon.) Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages. Network World on Twitter? You bet we are |
No comments:
Post a Comment