Search This Blog

Friday, January 08, 2010

FTC to examine cloud privacy concerns; Top 10 Security Nightmares of the Decade

Top 10 Security Nightmares of the Decade; Y2K all over again in 2010?
Network World logo

Compliance Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by Tripwire
rule

FISMA Prescriptive Guide
Learn how Tripwire helps federal agencies, as well as the organizations and contractors that store, process or transmit federal information. The FISMA Prescriptive Guide contains case studies from three fictional federal agencies, each capturing the perspective of a key stakeholder in the FISMA compliance process.

Click here.

rule

Spotlight Story
FTC to examine cloud privacy concerns

In a development likely to be closely watched by Google Inc., Amazon.com, Microsoft Corp. and other vendors, the Federal Trade Commission is examining potential threats to consumer privacy and data security posed by cloud computing. Read full story

Related News:

Top 10 Security Nightmares of the Decade
Blame the Internet for the latest decade of security lessons. Without it, you probably wouldn't even recognize the terms phishing, cybercrime, data breach, or botnet. Let's revisit the top security horrors of the past ten years, and try to remember what we learned from each.

Y2K all over again in 2010?
A decade after the Y2K crisis, date changes still pose technology problems, making some security software upgrades difficult and locking millions of bank ATM users out of their accounts.

Secure USB Drives Not So Secure
Vendors admit many hardware-encrypted USB memory sticks contain a dangerous flaw that make them easy hack targets, and many more may be vulnerable

Restore Data After Motherboard Death
Peter's motherboard died. How can he retrieve the data on his hard drive?

Things That Didn't Happen in '09 And Probably Won't in '10
We look back at how well GFI's David Kelleher did on predicting what was NOT likely to happen in the security department this year.

Large-scale attacks exploit unpatched PDF bug
Hackers are exploiting a bug in Adobe's PDF software with both target and large-scale attacks a week before a patch is slated to be released.

Social networking hacks: Top 10 Facebook and Twitter security stories of 2009
Facebook and Twitter are in hackers' crosshairs in the top social networking security stories of the year.

Mac security reality check: mobile tech
Portable technology--laptops and iPhones particularly--come with their own special security risks. They can be lost, for starters. And iPhones can be made especially vulnerable if you jailbreak them. Here are some tips for keeping your mobile technology--and you--safe.

FBI investigating online school district theft
A New York school district has reverted to using paper checks after cybercriminals tried to steal about US$3.8 million from its online accounts just before Christmas, prompting an FBI investigation.

Heartland breach shows why compliance is not enough
Nearly a year after Heartland Payment Systems disclosed what turned out to be the largest breach involving payment card data, the company remains a potent example of how compliance with industry standards is no guarantee of security.

Outlook 2010 IT skills checklist: The vertical climb
Security, virtualization and cloud computing skills will help IT pros woo hiring managers, but the real advantage to candidates comes by way of industry specific-knowledge that helps them boost the business' bottom line with their high-tech talent.

Why traditional security doesn't work for SOA
SOA's strengths turn out to be highly exploitable entry points for attackers

Google Chrome OS may be security hotspot in 2010
Google's Chrome OS will be "poked" by hackers in 2010, in large part because it will be the "new kid on the block," a security researcher predicted Wednesday.

Zeus, Koobface, Conficker: How to fight
Cisco Systems Inc. highlighted the top security threats of 2009 by presenting Cybercrime Showcase Awards as part of its Annual Security Report.

Today from the Subnet communities

New giveaways! Win a year's worth of 24/7 video training from ClipTraining. Win books on WS2008 R2, Cisco WAAS and the CCIE. Deadline Jan. 31. Plus: On Cisco Subnet: Cisco buys Rohati Systems; On Microsoft Subnet: Charting out prices for Office 2010; On Google Subnet: Google plans free white spaces database.

Network World on Twitter? You bet we are


Decade in tech
Ethernet everywhereHere is a quiz on the most important or quirkiest tech stories to hit the front pages over the first 10 years of the 2000s.

Cool Yule Tools
Windows 7Best picks from this year and a look back at 10 years of tech toys and gadgety gifts.

Rapid Replication for Virtual Servers
What's the connection between virtualization and acceleration? It's deeper than you might think. See how these two hot technologies complement each other to consolidate servers, enhance DR and simplify the IT infrastructure.
Learn more.


Metzler: Virtualization and the Network Manager
The networks manager's role has changed significantly over the years. This Webcast highlights survey results of 460 IT pros and their experiences with network management. Learn how network automation is helping to address the unique challenges of both physical and virtual environments.
Learn more

 

January 08, 2010

MOST-READ STORIES

  1. Amazon to customer: $3B charge may stand as record
  2. 10 obsolete technologies to kill in 2010
  3. Google Nexus One vs. Top 10 phone security requirements
  4. 5 reasons why IE will lose market share in 2010
  5. 2020 vision: Why you won't recognize the 'Net in 10 years
  6. Y2K all over again in 2010?
  7. CES Preview: Gadgets for the year ahead
  8. Cisco buys Rohati Systems
  9. Google's 10 toughest rivals
  10. CES: Cisco readying home telepresence trials

802.11n Drives an Architectural Evolution
The sharp capacity increase possible with 802.11n is a compelling force behind the evolution in WLAN architectures. This paper examines both the centralized WLAN switch architecture and the optimized WLAN architecture, so that the wireless network choice an organization makes today will protect its investment and allow it to experience the substantial benefits of 802.11 for years to come.
Learn more



EMO Labs: Better Sound Through Innovation at DEMOfall 09

EMO Labs' Invisible Speaker innovation takes People's Choice Award top honors at DEMO conference.
Watch EMO Labs product launch.


 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2010

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments: