Search This Blog

Tuesday, May 18, 2010

Google's Wi-Fi Spying: What Were They Thinking?

Microsoft settles VPN patent case for $200M | Planes, trucks and now trains: Texting now under Federal attack on all fronts

Network World Security

Forward this to a Friend >>>


Google's Wi-Fi Spying: What Were They Thinking?
"Don't be evil" has gone all 1984 on us. Or so it seems after Google revealed Friday that its Street View cars, in addition to snapping photos of the world's roadways, have also been collecting sensitive personal information from unencrypted wireless networks. Read More


WHITE PAPER: Adobe

Close the Web 2.0 Communications Gap
Web 2.0 tools have yet to reach critical mass and broad user adoption. This Forrester report identifies the key Web 2.0 gaps and offers advice to: Build a framework that extends email, Upgrade document-based data collection, and Improve email and document exchange security. Read More

WHITE PAPER: MegaPath

Understanding the Value of Managed Security UTM Solutions
This Yankee Group paper describes why multiple security layers are needed to achieve comprehensive and cost-effective security solutions. Learn More

Microsoft settles VPN patent case for $200M
Microsoft today said it will pay communications software maker VirnetX $200 million to settle a three-year-old patent infringement case. Read More

Planes, trucks and now trains: Texting now under Federal attack on all fronts
The government today announced a proposed rule to stop the use of electronic devices by on-duty railroad employees; effectively going after yet another group of professionals who could harm the traveling public by texting or using other electronic devices while working.  Read More


WHITE PAPER: Oracle

Oracle Accelerate - Not Just Smart But Timely
This video highlights the Oracle Accelerate program - a group of pre-configured, tested solutions that combine Oracle enterprise applications and rapid implementation tools with industry-specific bundles. The program reduces the time, complexity and cost of deploying Oracle and is implemented by highly trained partners. Learn More.

8 in 10 browsers leave identifiable 'fingerprints,' EFF warns
The Electronic Frontier Foundation today warned that more than 80 percent of browsers reveal identifiable "fingerprints" that could allow a user's Web surfing to be tracked. The privacy watchdog urged that greater attention be paid to this by the public and policy makers. The results are based on an experiment EFF conducted with volunteers who visited this site - called Panopticlick - and allowed their... Read More

PCI Compliance: Five Things You Need to Know
As a good QSA will tell you, such security standards are meant to be a baseline. Good organizations go beyond cramming for annual PCI reviews. Read More


WHITE PAPER: Riverbed

Overcome Two Key Challenges with Virtualization
How do you accelerate virtualization for your enterprise - and take IT flexibility and cost savings to the next level? Start by downloading this whitepaper from Riverbed. WAN optimization is a class of technology that has rapidly been adopted across enterprises in order to address the challenges of bandwidth limitations and latency over the WAN. Click here!

Facebook Privacy is a Balancing Act
Despite the headlines and hyperbole around Facebook information privacy issues--and the public exodus of notable online personalities in protest--the reality is that Facebook membership is actually still growing. Social networking and data privacy are, in many ways, directly at odds and the solution comes down to user awareness and choice. Read More

5 low-risk, high-reward experiments for IT
Redefine your relationship with the business with these five small-scale, forward-thinking experiments Read More

Legal risks with virtual currencies in online games
As virtual currency shifts from being a prepayment for goods or services redeemable with one company to a widely accepted proxy for real currency or a means of transmitting money between various participants, Issuers need to consider state and federal services laws such as money transmitter laws and money service business laws. Read More

Facebook users warned of sexy 'Candid Camera Prank' attack
Security firms are warning Facebook users to beware of what's being called the "Candid Camera Prank" attack recently spotted on Facebook that tries to use the lure of a sexy video of a scantily clad woman on a bicycle to download a video player that's actually Hotbar adware, and maybe worse. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

15 copies of CCNP ROUTE study kits available and 15 copies of Unix and Linux System Administration Handbook up for grabs, too.Deadline May 31.

SLIDESHOWS

Car hackers can kill brakes, engine, and more
Researchers at the University of Washington and UC San Diego have taken a close look at the computer systems used to run today's cars and discovered new ways to hack into them, sometimes with frightening results.

20 Crazy Concept Phones
From snake phones to handsets that look like hockey pucks, these hopelessly impractical devices are the coolest-looking phones you'll never want to own.

MOST-READ STORIES

  1. Steve Jobs 2 a.m. e-mails: Apple motives pure, hits out at Adobe
  2. Car hackers can kill brakes, engine and more
  3. When Gizmodo editor Brian Lam e-mailed Steve Jobs
  4. Major Wi-Fi changes ahead
  5. Wi-Fi key-cracking kits sold in China means free Internet
  6. Joomla! 1.6 aims squarely at enterprise
  7. IPv6: D-Day coming for ISPs
  8. Natal to be on MTV with Cirque du Soleil
  9. NetFlow Part 1
  10. Google admits Street View cars collected Wi-Fi data

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: