Thursday, December 10, 2009

H4ck3rs are people too: Film review

FTC sues to stop robocallers; TSA posts document on airport screening procedures online
Network World logo

Security Strategies Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by 3COM
rule

Comprehensive NAC
Read this whitepaper on improving endpoint defense, control and visibility through integrated management and enforcement.

Learn more

rule

Spotlight Story
H4ck3rs are people too: Film review

During the 1990s, the term "hacker" became synonymous with "cracker," which is a person who performs some form of computer sabotage. The association is understandable. In order to be an effective cracker, you had to be a good hacker, thus the terms got intertwined, and hacker won out in the popular press. Read full story

Related News:

FTC sues to stop robocallers
The Federal Trade Commission today said it was going after three outfits that allegedly made robocalls to sell worthless credit-card interest-rate reduction programs for large up-front fees of as much as $1,495.

TSA posts document on airport screening procedures online
In a gaffe called "shocking" and "reckless" by some U.S. lawmakers, the Transportation Security Administration inadvertently posted online a 93-page document containing highly sensitive information on airport screening procedures.

Computer of alleged Sarah Palin hacker had spyware
The 21 year-old college student charged with hacking former Alaska Governor Sarah Palin's Yahoo e-mail account was using a compromised computer that was secretly logging and reporting information without his knowledge, his lawyers say.

Report predicts rise of self-defending botnets
The world is not only losing the war against spam, the situation might be about to get a whole lot worse with the emergence of a new type of automatic botnet able to thrive without direct human control, Symantec's MessageLabs division has warned.

Guard Your Online Privacy With Firefox Addon
As you browse the Web, Web sites watch you. Information is gathered about you, potentially shared with others, and possibly kept for a very long time. Which sites gather this information and which don't...and what do they do with the information? There's no practical way to know--unless you use TrackerWatcher, that is. This excellent, free Firefox add-on checks the privacy tracking features of Web sites you visit, and reports the results to you in great detail.

Today from the Subnet communities

On Cisco Subnet: Amazon EC2 and Symantec: What Does it Mean? and Way too Easy: Dynamips Under Linux; On Microsoft Subnet: How To Run Windows 7 Virtualized on Mac OS X; On Google Subnet: Make money on Android? Mobile Ad Cents

Network World on Twitter? You bet we are


Ethernet everywhere!
Ethernet everywhereInside planes, trains, cars and spaceships, Ethernet is a morph master. Here's a look at some of Ethernet's cooler implementations.

7 tools to ease Windows 7 rollout
Windows 7These utilities help you plan, ensure app compatibility and manage images.

Linux and Unix in Your Environment? Don't Leave Security to Chance
Most businesses today rely on the stability and power of Linux or Unix in their data centers. However, these venerable platforms also create some compliance and security challenges.In this white paper, you'll learn to get the most from your Linux or Unix environment, while ensuring your data is safe and secure.
Learn More


Staying a step ahead of the hackers
Security managers may work for midsize or large organizations; they may operate from anywhere on the globe. But inevitably, they share a common goal: to better manage the risks associated with their business infrastructure.
Learn More

 

December 10, 2009

MOST-READ STORIES

  1. Reasons not to buy Cisco
  2. Microsoft releases six new patches
  3. FTC sues to stop robocallers
  4. A hands-on tour: Google Goggles Visual Search
  5. Can you work on a virtualized Windows desktop?
  6. Facebook shuts down Beacon program, settles lawsuit
  7. Network IPS tests reveal equipment shortcomings
  8. How to fight malware
  9. Man lost $127M at casinos owned by Cisco customer
  10. Network router cheat sheet

When Pressing the Send Button Results In Compliance Violations
Protecting confidential data is serious business. Failure may result in fat fines and even jail time - not to mention damage to your brand. WatchGuard's easy-to-use, all-inclusive email and web secure content and threat prevention appliances offer a complete data protection solution.
Click here.



EMO Labs: Better Sound Through Innovation at DEMOfall 09

EMO Labs' Invisible Speaker innovation takes People's Choice Award top honors at DEMO conference.
Watch EMO Labs product launch.


 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments:

Post a Comment