Monday, March 22, 2010

IRS security faults leave taxpayer information at risk

IE8, iPhone will fall first day of hacking contest, predicts organizer | US to develop smart machines with visual intelligence

Network World Security

Forward this to a Friend >>>


IRS security faults leave taxpayer information at risk
In this the heavy tax season where billions of dollars and tons of personal information is relayed to and from the government, it's more disconcerting to hear that the Internal Revenue Service is still struggling to keep private information secure. Read More


WHITE PAPER: Qwest

Connecting to Better Customer Service
Less than a third of surveyed IT executives believe their companies are "highly effective" at adapting to changing customer needs and priorities. Businesses that build a robust voice and data network infrastructure can achieve a high level of responsiveness, and transform customer information and feedback into actionable results. Click here.

WHITE PAPER: Websense

Websense Security Labs State of Internet Security 2H09
Do you know just how adept Web adversaries have become in using the Internet to spread malware in their attacks? Understand where the true threats lie with this report which summarizes the significant findings of Websense researchers using the ThreatSeekerâ„¢ Network during the six-month period ending December 2009. Learn More

IE8, iPhone will fall first day of hacking contest, predicts organizer
Microsoft's Internet Explorer 8, not Apple's Safari, will be the first browser to fall in next week's Pwn2Own hacking challenge, the contest organizer said today. Read More

US to develop smart machines with visual intelligence
The Defense Advanced Research Projects Agency (DARPA) is set to develop a system that will let machines or robots have visual intelligence similar to humans.  Read More

Two Madoff computer admins indicted
Two former computer administrators who worked for convicted financial fraudster Bernard Madoff's investment firm were indicted this week on charges of conspiracy and falsifying financial records. Read More


WHITE PAPER: Cisco Systems Inc.

Peace Corp: Creating a worldwide unified network
Learn how the Peace Corp made its unified network a reality after selecting and deploying cost-effective WAN optimization gear. One of the key factors was selecting a platform that integrated with its existing network spanning 70 countries. The result is dramatically improved performance and significant cost savings. Learn More

Fired CISO says his comments never put Penn.'s data at risk
Former Pennsylvania CISO Robert Maley, who was fired after speaking at RSA without proper authorization, offer his side of the events that led to his dismissal. Read More

The FBI on Facebook: Watching every move you make
It seems 2010 may be the year personal privacy makes a comeback -- that, or it's taking its final breath before it sinks into the tarpits. Every week brings news of some new affront to our personal data, accompanied by a backlash. Lately these stories have been bubbling up on an almost daily basis. Read More

Tailored enterprise security solutions needed: Trend Micro
The rapidly evolving information technology threat landscape means enterprises are now demanding tailored security solutions across physical, cloud computing and virtualised environments, according to IT risk and compliance specialists Trend Micro. Read More


WHITE PAPER: Polycom

Top Five Benefits of Video Conferencing
From obvious benefits, like reduced travel costs, to a few less apparent advantages, see what Polycom customers, resellers and industry analysts are saying about the power of video conferencing. Read More

Spider email joker's website suspended
The website of infamous Internet prankster, David Thorne, has been suspended. Read More

Google patches Chrome days before hacking contest
Google has patched 11 vulnerabilities in the Windows version of Chrome, including one that earned its finder the first $1,337 check from the company's new bug bounty program Read More

Judge approves Facebook's settlement offer in Beacon case
A federal judge has approved a proposed settlement by Facebook in a class-action lawsuit involving its now defunct Beacon behavioral tracking service. Read More

Weak states leave EU open to cyberattack
EU states need to work far more closely with one another to have any chance of fending off the sort of cyberattacks that caused huge problems for Estonia in 2007, a House of Lords report has said. Read More

Attack Samples Show Targeted Sophistication
If you'd like to know what a targeted e-mail attack looks like, take a look at samples posted today by antivirus maker F-Secure. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

The Future of Big Iron
Do your IT plans include mainframes? Participate in this Aberdeen survey and see how your plans stack up to those of peers in terms of on what core applications are staying on mainframes and where the industry is headed in operating and software architecture. The goal is to get an accurate picture of the opportunity for expanded utilization, the role of 3rd-party support, and overall objectives with respect to distributed, outsourced, heterogeneous and centralized computing paradigms. Aberdeen will also establish a baseline for performance and a set of best practices for improving the efficiency and utilization of mainframe computing technologies. All survey respondents will receive a free copy of the resulting research.

Today from the Subnet communities

Massive giveaway from Cisco Subnet: 50 copies of the Cisco Press CCNP Cert Kits kits are up for grabs. Deadline March 31. NEW! 15 books on Microsoft System Center Operations Manager (OpsMgr) 2007 R2 available, too.

SLIDESHOWS

21 apps Apple doesn't want on your 3.0 iPhone
The following 21 apps today run only on jailbroken iPhones. Some may even prove precursors to features released in future Apple iPhone firmware updates.

10 geeky items you're embarrassed to admit you want
Most of us love gadgets. But there is a certain eye-popping reaction when we find a gadget that speaks to our technological selves. Owning such devices would surely be the subject of teasing from those who deny their inner geek, but it would also be the cause of more than a little envy.

MOST-READ STORIES

  1. Is this the year the proprietary CMS dies?
  2. Microsoft lowers Windows licensing costs for virtual desktops
  3. Top 12 tech knockoffs
  4. Windows XP: No IE9 for you
  5. Mobile developers take measure of Windows Phone 7
  6. Wireless router basics
  7. Comcast, ISC offer IPv6 transition tool
  8. New Cisco Ethernet switches to play a broader video, security roles
  9. Cisco defends its Borderless
  10. Doing the laptop drive of shame, Part III

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment