Friday, December 11, 2009

FTC: Explicit content in virtual worlds too easy for minors to see

FTC: Explicit content in virtual worlds too easy for minors to see; DNS flaw fixed, Neustar claims
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by Symantec Corporation
rule

Is Your Security Software Impacting Performance?
Independent research shows Symantec Endpoint Protection is faster and more efficient than other vendors' solutions, while providing unmatched defense against malware for laptops, desktops and servers. It seamlessly integrates essential security technologies in a single agent and management console. Switch now and get up to a 45% trade-in discount.

Learn More Now

rule

Spotlight Story
Security from the Cloud vs. Securing The Cloud

There are two sides to the cloud security discussion: Securing cloud services and security as a cloud service (SecaaS). SecaaS (like Software as a Service) changes the economics of enterprise security by offering fee-for-service billing and limited or no upfront capital expense (CapEx). Given that 35% of organizations tell us their IT budget is shrinking, anything that reduces CapEx is highly... Read full story

Related News:

FTC: Explicit content in virtual worlds too easy for minors to see
The Federal Trade Commission today said minors can access explicit content in 70% of the virtual worlds it reviewed in a congressionally mandated report and urged virtual world operators to make key enhancements aimed at reducing the risk of youth exposure to such content.

DNS flaw fixed, Neustar claims
Neustar, a provider of managed DNS services to e-commerce sites, says it has developed an innovative, low-cost fix to a well-known problem that prevents DNS updates from getting propagated quickly across the Internet.

The Pain of PoS Patching
A basic—and often painful—security best practices is system patching. It's a basic requirement of any good security policy and is a mandate of regulations and legislation such as the Payment Card Industry Data Security Standard (PCI-DSS) and the Health Insurance Portability and Accountability Act (HIPAA). There are plenty of automated systems on the market but we still find organizations patching...

Five Shortcuts to PCI Compliance
By now we all know that the key to becoming PCI compliant is all about how well you can control the number of in-scope devices. Obviously, the smaller your scope the better. The challenge is how to efficiently and judiciously reduce your PCI scope without breaking everything and costing you a ton of cash. Re-architecting your network to reduce and define PCI scope is one of the first action items...

Hackers find a home in Amazon's EC2 cloud
Security researchers have spotted the Zeus botnet running an unauthorized command and control center on Amazon's EC2 cloud computing infrastructure.

Facebook privacy changes draw mixed reviews
Facebook's revamped privacy settings will push more user data onto the Internet and, in some cases, make privacy protection harder for Facebook users, digital civil liberties experts said.

A back door to the network architecture
Recently, Network World's authors have reviewed gadgets that give your users the ability to quickly and cheaply put gobs of information onto the Internet and into other people's hands.

Microsoft knew of just-patched IE zero-day for months
Microsoft may not have hustled as fast as researchers thought when the company patched a zero-day bug in Internet Explorer (IE) just 18 days after exploit code went public.

Postal Service extends AT&T managed VPN pact
AT&T's government marketing arm will announce today that it has received a four-year, $120 million contract extension that will allow the carrier to continue providing managed VPN services to the U.S. Postal Service.

Today from the Subnet communities

On Cisco Subnet: Amazon EC2 and Symantec: What Does it Mean? and Way too Easy: Dynamips Under Linux; On Microsoft Subnet: How To Run Windows 7 Virtualized on Mac OS X; On Google Subnet: Make money on Android? Mobile Ad Cents

Network World on Twitter? You bet we are


Ethernet everywhere!
Ethernet everywhereInside planes, trains, cars and spaceships, Ethernet is a morph master. Here's a look at some of Ethernet's cooler implementations.

7 tools to ease Windows 7 rollout
Windows 7These utilities help you plan, ensure app compatibility and manage images.

Secure in 15 - Start with Daily Practices
Get the Secure in 15 toolkit starting with the "15 Minutes Month-at-a-Glance" calendar. McAfee will send you additional tools and tricks to stay protected around the clock.
Click here to learn more.


When Pressing the Send Button Results In Compliance Violations
Protecting confidential data is serious business. Failure may result in fat fines and even jail time - not to mention damage to your brand. WatchGuard's easy-to-use, all-inclusive email and web secure content and threat prevention appliances offer a complete data protection solution.
Click here.

 

December 11, 2009

MOST-READ STORIES

  1. Microsoft getting better at Patch Tuesday updates, experts say
  2. 13 of Microsoft's most important product releases for 2009
  3. Reasons not to buy Cisco
  4. Clearwire network down for hours in handlful of cities
  5. Hackers find a home in Amazon's EC2 cloud
  6. Network router cheat sheet
  7. Bots, bombs and weird science: The wackiest stories of 2009
  8. 802.11ac standard will bring gigabit speeds to Wi-Fi
  9. AT&T wireless chief defends 3G network
  10. 'Magic Quadrant' whiner just won't quit

Achieve Data Warehousing Performance with a Column-Oriented Database
The growing demand for deep-dive data mining, complex event processing and strategic business analytics puts increased demands on today's data bases and data warehouse. Learn how an alternative data base approach, which begins by storing data by columns instead of rows, has proven to meet today's exploding data warehouses.
Read this Paper Now!



EMO Labs: Better Sound Through Innovation at DEMOfall 09

EMO Labs' Invisible Speaker innovation takes People's Choice Award top honors at DEMO conference.
Watch EMO Labs product launch.


 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments:

Post a Comment