Search This Blog

Monday, May 24, 2010

IBM red-faced after handing out infected USB drives

Firewalls and more tethering | FTC greenlights Google-AdMob deal

Network World Security

Forward this to a Friend >>>


IBM red-faced after handing out infected USB drives
Delegates at an Australian security conference got hit by a double dose of malware thanks to IBM Read More


WHITE PAPER: ArcSight

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center

WHITE PAPER: ShoreTel

Conquer the Cost of IP Complexity
Companies are frequently tied to expensive, complex, legacy telecommunications systems that don't support modern technologies and applications, such as unified communications. This white paper examines the challenges associated with legacy systems and how to achieve greater value and opportunities with IP-based technology. Read More

Firewalls and more tethering
Mark Gibbs wrestles with a firewall and cell phone tethering software. Read More

FTC greenlights Google-AdMob deal
The Federal Trade Commission today said it closed the investigation of the proposed  $750 million Google acquisition of mobile advertising network company AdMob.  Read More


WHITE PAPER: Riverbed

Overcome Two Key Challenges with Virtualization
How do you accelerate virtualization for your enterprise - and take IT flexibility and cost savings to the next level? Start by downloading this whitepaper from Riverbed. WAN optimization is a class of technology that has rapidly been adopted across enterprises in order to address the challenges of bandwidth limitations and latency over the WAN. Click here!

How managers stopped worrying and learned to trust the cloud
Managers are getting more trusting on cloud security Read More

A third of over 55s worried about ID theft
More than a third of over 55s say having their ID or bank details stolen is their biggest worry when it comes to the web, says Panda Security. Read More


WHITE PAPER: Splunk

Make IT Data a Strategic Asset
This paper outlines the struggles organizations face managing silos of IT data and how, using Splunk, users are changing the way they do their jobs and elevating the role of IT in their organizations. Learn More!

Does Google Have Wi-Fi Data from Your Company?
Google is facing scrutiny and investigation around the world following revelations that it has been capturing and archiving wi-fi data collected by its Google Street View vehicles that drive around capturing the image data used by the Street View service. It is questionable whether Google should have done that, but what is not questionable is whether or not Google should have any data from your wi-fi network. Read More

Social Networks May Be Sharing Your Info with Advertisers
Lately, social networking sites have been bending over backwards to assure their users that user privacy is of utmost importance--but it may have all been in vain, as the Wall Street Journal discovered Thursday that several social networking sites are sharing, with advertisers, information that can be used to identify individuals. Read More

Oracle buys Secerno to get database firewall
Oracle has bought UK database security startup Secerno for an undisclosed sum, bringing to an end the independence of one of the last decade's most unusual UK-based startups. Read More

Black duck eggs and other secrets of Chinese hackers
Black duck eggs on the menu of a Chinese restaurant drew the suspicions of a security consultant reporting to renowned security expert Ira Winkler.The colleague, a former Russian security agent named Stan, was at a new Chinese restaurant in "the middle of nowhere" in the United States, but conspicuously near the R&D center of a Fortune 5 U.S. business. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

15 copies of CCNP ROUTE study kits available and 15 copies of Unix and Linux System Administration Handbook up for grabs, too.Deadline May 31.

SLIDESHOWS

Car hackers can kill brakes, engine, and more
Researchers at the University of Washington and UC San Diego have taken a close look at the computer systems used to run today's cars and discovered new ways to hack into them, sometimes with frightening results.

20 Crazy Concept Phones
From snake phones to handsets that look like hockey pucks, these hopelessly impractical devices are the coolest-looking phones you'll never want to own.

MOST-READ STORIES

  1. Steve Jobs: Unimpressed with Google open source video codec
  2. Just when you thought the iPad couldn't be more popular
  3. Google says Google TV coming this fall
  4. Wal-Mart pushing for chip-and-pin payment cards in U.S.
  5. Black duck eggs and other secrets of Chinese hackers
  6. Cisco makes another optical acquisition
  7. I could license you to use this software, but then I'd have to kill you
  8. FTC takes out notorious porn- and botnet-spewing ISP
  9. Just how many radios do you need, anyway?
  10. Google rolls out Android OS upgrade

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: