Thursday, October 22, 2009

Coffins in the mail are a trick of the cybercrime trade

Medical records sale scandal a 'data, not outsourcing issue'; Consumers should clean up their act on personal security
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by HP
rule

IDC: Optimizing Storage to Reduce Data Footprint and Lower Costs
Read this review on today's storage optimization and technologies. Learn how they reduce the data footprint and identify how various technologies work toward this goal.

Learn more

rule

Spotlight Story
Coffins in the mail are a trick of the cybercrime trade

There's never been a better time to get involved in cybercrime. Read full story

Related News:

Medical records sale scandal a 'data, not outsourcing issue'
The National Outsourcing Association has defended the industry following revelations on ITV's Tonight programme about the sale of UK medical records in India.

Consumers should clean up their act on personal security
PC users leave too many clues fore hackers - and social networking sites make the problem worse warns a researcher

Survey: Singaporean Web users unable to spot phishing
Eighty-three per cent of Web users in Singapore are at risk from online fraud because they can't identify the prevalent forms of phishing, according to a YouGov survey.

Gartner on cloud security: 'Our nightmare scenario is here now'
Virtualization and cloud computing shaking up the old order, and the customary control is slipping away from security managers as the revolution unfolds.

Open source security project could get a boost with Metasploit buy
Rapid7 is buying Metasploit, and promising to advance open source penetration testing and the Metasploit Project, which develops exploits against known vulnerabilities.

Two out of five at risk from Wi-Fi hijacking
Two out of five web users are at risk of having their Wi-Fi connection hijacked, says TalkTalk.

Facial-recognition system can guess your age
ORLANDO -- Those advertising in public places would really like to know the age and gender of those viewing their ads to see if they're hitting the right demographic. An experimental facial-recognition system developed by NEC does a pretty good job of delivering just that information.

Experts see forecast worsen for cybercrime
Law enforcement agencies can count a few recent victories against cybercriminals, but agents say the battle against them isn't getting any easier.

Microsoft Subnet is giving away training from Global Knowledge and 15 copies of Microsoft Expression Web 3 In Depth. Cisco Subnet is giving away training from Global Knowledge and 15 copies of Building Service-Aware Networks. Google Subnet is hosting many new bloggers. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


Ethernet everywhere!
Ethernet everywhereInside planes, trains, cars and spaceships, Ethernet is a morph master. Here's a look at some of Ethernet's cooler implementations.

7 tools to ease Windows 7 rollout
Windows 7These utilities help you plan, ensure app compatibility and manage images.

Why Small Companies Should Think Outside Box for Protecting Endpoints
In their "Sector Insight" study, Aberdeen Group investigated the considerations small business should take when selecting anti-malware solutions. Read this paper to learn why Aberdeen recommends small enterprises be open to endpoint security solutions from vendors other than McAfee and Symantec.
Read Now


Identity Management E Guide
Identity management cannot be ignored – it is the key to preventing data breaches. This Network World Executive Guide provides in-depth information on today's most pressing security issues.
Read More

 

October 22, 2009

MOST-READ STORIES

  1. IBM takes aim at Windows 7 with new desktop offering
  2. The top 7 roadkill victims on the journey to Windows 7
  3. Reports: Google to launch music service and phone
  4. Goodbye steering wheel, here comes drive-by-joystick
  5. Verizon fires shots across iPhone's bow with Droid smartphone
  6. Deck out your home office
  7. Facebook for scientists gets millions in funding
  8. Cisco unveils new generation of branch routers
  9. What the heck are you doing on the Internet at that hour?
  10. Ballmer takes on SharePoint future, software licensing issues, Sidekick woes

Vulnerability Management Checklist
Discover the 12 key decision points you need to consider when choosing a vulnerability management solution. This checklist walks you step-by-step through critical questions to ensure you select the solution that will best protect your network and data.
Learn more now.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments:

Post a Comment