Tuesday, October 13, 2009

Data-theft trojans and the changing face of the Web

UC Berkeley tightens personal data security with data-masking tool; Snow Leopard Bug is a Doozy, How Did Apple Miss It?
Network World logo

Security Strategies Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by Akamai
rule

Akamai and Cisco on App Delivery
Akamai and Cisco have teamed up to offer a complete set of application delivery solutions addressing delivery over the Internet and private WAN. These solutions can help your organization manage application delivery challenges and provide you with optimal application performance, scalability, availability, and security.

Learn more.

rule

Spotlight Story
Data-theft trojans and the changing face of the Web

In 2004, Russell Beale of the University of Birmingham penned an interesting article discussing the social changes taking place on the Web. In his summation, Professor Beale noted, "We have split the Web atom – previously atomic units were Web pages – once you'd got them you could analyze them into text and graphics, but you generally dealt in whole pages. Now our atomic unit is much smaller – we can construct things out of fragments of pages. And this makes a second difference – consumers can look only at what they want." Read full story

Related News:

UC Berkeley tightens personal data security with data-masking tool
To better safeguard the personal data of its students, the University of California at Berkeley (UC Berkeley) has adopted a specialized data-masking technique in its application development work that effectively can hide data in plain sight by mixing it up.

Snow Leopard Bug is a Doozy, How Did Apple Miss It?
Reports of a major bug in Snow Leopard, the latest version of Mac OS X that debuted in August, are creating dismay among Mac users in Apple's support forums, on Twitter, and elsewhere across the Web.

Secrecy vs. privacy
When Bob Blakley talks, I listen. Blakley is vice president and research director for the Burton Group's Identity and Privacy Strategies. Before that he was chief scientist for security and privacy at IBM. He rarely speaks about identity and security issues without weighing all of the possibilities and coming to a reasoned conclusion. So when he says that an analyst from another organization is "dead wrong" you can bet he'll back it up with an elegant argument.

Most disturbing tech stories of the week: shooting an iPhone, squeezing Nortel dry
Disturbing tech stories this week include a man allegedly threatening to shoot his iPhone at an Apple Store and a former Nortel exec seeking to squeeze millions from the bankrupt company.

Sidekick fiasco highlights need for mobile backups
The loss of personal data that Sidekick users in the U.S. have suffered is a shame, but it also shows how important data stored on mobile phones has become.

Microsoft Subnet is giving away training from Global Knowledge and 15 copies of Microsoft Expression Web 3 In Depth. Cisco Subnet is giving away training from Global Knowledge and 15 copies of Building Service-Aware Networks. Google Subnet is hosting many new bloggers. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


Cell towers in disguise
Cell towersSome of the cell towers that dwell among us are cleverly hidden; others, not so much.

The ultimate smartphone
SmartphonesWhat if you could combine the best parts of every phone out there?

3 Key Strategies to Improving Efficiency in Network and App Management
Change your approach to network management and you will improve network performance and reduce costs. Join us for this Webcast for all of the details. Network World Editor-in-Chief John Dix moderates the panel that includes EMA analyst Jim Frey and Dan Klimke, Fluke Networks.
Learn more.


The Business Case for Server Refresh
Can an investment in new servers really save money? Yes, in fact their increased performance, lower energy costs and ability to optimize virtualization can reduce annual energy costs by 92% and provide payback in as little as 3 months. Learn the reasons to consider a server refresh.
Read More

 

October 13, 2009

MOST-READ STORIES

  1. Developer ups iPhone app to $40 after complaints about price
  2. Microsoft loses Sidekick users' personal data
  3. House decommissions last mainframe, saves $730k
  4. Sidekick users livid
  5. One by one, carriers succumb to Google Voice
  6. Engineers fix shortcoming of firewalls
  7. 7 tools to ease your Windows 7 rollout
  8. Cisco releases pricing for rack servers
  9. From Sidekick to Gmail: A history of cloud computing outages
  10. 'A bear ate my iPhone!'

Managed Security for a Not-So-Secure World
Today's risky data environment, which has seen 213 data breaches in the first five months of 2009, is colliding with an IT landscape of shrinking resources. This paper explains how an IT and security service provider can provide a practical, manageable and reliable solution.
Read More



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments:

Post a Comment