Tuesday, December 01, 2009

SANS official talks security

FTC slams spam gang boss with $15 million fine; Why Criminal Hackers Must Not Be Rewarded
Network World logo

Security Strategies Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by 3COM
rule

Comprehensive NAC
Read this whitepaper on improving endpoint defense, control and visibility through integrated management and enforcement.

Learn more

rule

Spotlight Story
SANS official talks security

This is the second of two parts of an interview of Stephen Northcutt by technologist David Greer. Read full story

Related News:

FTC slams spam gang boss with $15 million fine
Whether or not anyone actually ever gets this money remains to be seen but at the behest of the Federal Trade Commission, a federal judge has ordered the mastermind of what was a vast international spam network to pay $15.15 million in a default judgment for his role in running the operation which sent out billions of junk e-mails.

Why Criminal Hackers Must Not Be Rewarded
In 1995, I participated in a debate with distinguished security expert Robert D. Steele, a vigorous proponent of open-source intelligence.

Latest Microsoft patches cause black screen of death
Microsoft's latest round of security patches appears to be causing some PCs to seize up and display a black screen, rending the computer useless.

British Airways to pay thousands for Web airfare glitch
You knew this one was too good to be true: British Airways offering US-to-India for $40? Well, 1,200 people tried to take advantage of the offer within minutes of its posting on the air carrier's Web site only to have their bookings cancelled after BA realized the error (the lowest US-India fare being offered by British Airways at the time was over $750).  

Call for jail sentences after police hand over information
The Information Commissioner has called for tougher penalties over the reckless misuse of data, after police officers were found to have wrongly handed over sensitive data to dangerous individuals.

Hack In The Box heading to Holland
The organizers of the Hack In The Box security conferences in Malaysia are planning their first European show for Amsterdam next July.

Home Secretary says McKinnon must face US trial
Computer hacker Gary McKinnon looks set to face trial in the US after Home Secretary Alan Johnson said there were no grounds to prevent his extradition.

Microsoft adds identity to cloud
Everyone eyeing Microsoft's Azure, their candidate for cloud-based computing, can at least agree on one thing: Redmond is late to the party that's dominated by Salesforce.com, Google, Amazon and a host of others. How can they hope to differentiate themselves?

FCC: Internet program for deaf cheated out of millions of dollars
In court the Federal Communications Commission has charged 26 people with defrauding the agency of "tens of millions of dollars" from its program that lets people with hearing disabilities to communicate with hearing individuals through the use of interpreters and Web cameras. 

November giveaways
Cisco Subnet is giving away free books on VMware vSphere security. Microsoft Subnet is giving away training from New Horizons and free books on Exchange Server 2010. Google Subnet is giving away free books on Android app development. Entry forms can be found on the main contest page. Trivia answers are revealed on each main Subnet page.

Network World on Twitter? You bet we are


Ethernet everywhere!
Ethernet everywhereInside planes, trains, cars and spaceships, Ethernet is a morph master. Here's a look at some of Ethernet's cooler implementations.

7 tools to ease Windows 7 rollout
Windows 7These utilities help you plan, ensure app compatibility and manage images.

Five Steps to Determine When to Virtualize Your Servers
Server virtualization isn't just for big companies. Entry-level virtualization tools are low cost, and there are many benefits to virtualization. It's not a question of "if" you should virtualize your servers - but "when." This white paper outlines five solution-agnostic steps to help you determine when to virtualize your servers.
Learn more now.


The Power of Unified Resource Management
Get the network performance, reliability and agility that are critical to your company's success with a unified resource management platform. Effectively manage not just your network but the applications, services and users the network enables. Gain full, end-to-end network visibility by selecting the right resource management platform.
Learn more

 

December 01, 2009

MOST-READ STORIES

  1. Latest Microsoft patches cause black screen of death
  2. 10 IT management technology start-ups to watch
  3. Five ways to lose your identity (and wallet) this holiday season
  4. Is certification valuable, or not?
  5. Why criminal hackers must not be rewarded
  6. Cisco pedigree wins over VCs
  7. Microsoft's top developers prefer old-school coding methods
  8. Nintendo DSi Bundle
  9. 15 free downloads to pep up your old PC
  10. The cell phone camera conundrum

Staying a step ahead of the hackers
Security managers may work for midsize or large organizations; they may operate from anywhere on the globe. But inevitably, they share a common goal: to better manage the risks associated with their business infrastructure.
Learn More



EMO Labs: Better Sound Through Innovation at DEMOfall 09

EMO Labs' Invisible Speaker innovation takes People's Choice Award top honors at DEMO conference.
Watch EMO Labs product launch.


 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments:

Post a Comment