Monday, April 26, 2010

FBI: Finding criminal data on cell phones and game consoles is tough

Managers: Get on the security bandwagon | iPad Case Roundup 3: The Revenge of the Protected

Network World Security

Forward this to a Friend >>>


FBI: Finding criminal data on cell phones and game consoles is tough
Non-traditional communications devices such as smartphones and game consoles pose a particular problem to law enforcement agencies trying to milk them for forensic data that reveals criminal activity, attendees were told at the 2010 Computer Forensics Show in New York City. Read More


WEBCAST: Oracle

Identity and Access Governance – What You Need to Know
Live Webcast: Wednesday, May 5th at 1pm ET/10 am PT. Oracle presents a timely event featuring the Burton Group's, Kevin Kampman, who will provide an overview of the latest technology for identity management. Get guidance on compliance, security, identity management and other topics and participate in a live Q&A. Register Today!

WHITE PAPER: Sophos

Best practices for implementing Windows 7
If you're planning to roll out Windows 7, now is the time to review your endpoint and data protection strategies to make sure that you're taking full advantage of the new security features as well as enhancing your overall security for enterprise deployments. Read Now.

Managers: Get on the security bandwagon
Dear Managers: Help Wanted! Read More

iPad Case Roundup 3: The Revenge of the Protected
Now that the iPad is shipping, it's time for another journey down the virtual isles of iPad cases. Manufacturers have continued a steady stream of case announcements since our first and second iPad case roundups, so here is a third for your accessorizing pleasure. Cases are once again organized alphabetically by manufacturer name. Read More

McAfee exec adds new apology, sketchy explanation for update debacle
A McAfee executive issued an apology for the company's release of a faulty signature update that crippled thousands of business Windows PCs starting early Wednesday, Read More


VIRTUAL EVENT: CIO, Computerworld, CSO, InfoWorld & Network World

Live Security Panel – April 28th
Join us on April 28th for a live virtual event that will provide candid, expert advice on top security challenges and issues – all from the comfort of your desktop. Get in on the discussion - from the unique challenges presented by cloud computing and virtualization to the mass adoption of social media. Attend and you may win a Kindle!

NASA wants public to join in Hubble Telescope's 20th anniversary extravaganza
The Hubble Space Telescope has taking snapshots of the universe for 20 years this week and as part of that anniversary, the space agency is looking to crowdsource new galaxy images and promote social network celebrations.  Read More

1.5 million stolen Facebook IDs up for sale
A hacker named Kirllos has a rare deal for anyone who wants to spam, steal or scam on Facebook: an unprecedented number of user accounts offered at rock-bottom prices. Read More

New tool makes end users responsible for data loss prevention
When there is a real-time alert, someone in IT has to make a decision: let the action go or quarantine the data. This is too time-consuming, and it requires IT to inspect the data. Check Point Software Technologies just introduced a DLP solution that puts the onus for remediating the alert onto the worker who triggered it. Read More


WHITE PAPER: ArcSight

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center

You Don't Have to Remember Your Passwords
Coolfoster asked the Answer Line forum for a secure way to remember passwords Read More

SEC workers spent hours at work watching online porn
Several senior SEC staffers spent hours daily watching porn on their work computers even as the massive financial crisis was unfolding in 2008, according to agency's inspector general. Read More

Facebook's New Features & Privacy: All You Need To Know
Facebook is about to get a lot more personal and dig deeper into you and your friends' likes, dislikes, and what you do online. This week at a Facebook developers conference called F8, the company pulled the curtain back on some very cool and soon to be available features. Read More

Fundamental causes of spam
Unsolicited commercial – and usually fraudulent – e-mail (spam) is a constant headache for individual users and for mail-server administrators. In this second part of a three part series, I look at why we are suffering from this plague. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

15 copies of CompTIA A+ study kits (book, video, flash cards) are available from Cisco Subnet.Deadline April 30. 15 books on Microsoft Systems Center Enterprise suite are available, too.

SLIDESHOWS

12 "White Hat" hackers you should know
These "White Hat" security researchers are ethical hackers whose discoveries and inventions shake things up - as they try to stay one step ahead of their underground "Black Hat" cousins.

Interop history quiz
The venerable networking tradeshow Interop convenes this month in Las Vegas. Answer the following 10 questions about Interop, keep score and see how you stack up at the end.

MOST-READ STORIES

  1. Confessions of tech hoarders
  2. Google, YouTube received 10,000 gov't requests for user data
  3. McAfee apologizes for PC anti-virus snafu
  4. McAfee's DAT 5958 debacle goes on
  5. Steve Jobs: Savior or tyrant?
  6. 5 hot IT certification picks for 2010
  7. Cisco's move to open-source its Telepresence is genius
  8. Flawed McAfee update paralyzes corporate PCs
  9. Recovering from the flawed McAfee update
  10. Other top-secret Apple projects found at a bar

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment