Search This Blog

Wednesday, May 12, 2010

Should there be a Geneva Convention for fighting cyberwar?

Cybercrime tops Attorneys General meeting | System to surgically jam electronics taking shape

Network World Security

Forward this to a Friend >>>


Should there be a Geneva Convention for fighting cyberwar?
The term "cyberwar" has been bandied about in recent years as a catchalll term for the hackers stealing credit card numbers or spreading spam, but also much more nefarious schemes such as breking into a electricity grid. At a recent cybersecurity conference, one Microsoft security executive said we might need global rules on how to fight such threats. Read More


WHITE PAPER: Riverbed

Overcome Two Key Challenges with Virtualization
How do you accelerate virtualization for your enterprise - and take IT flexibility and cost savings to the next level? Start by downloading this whitepaper from Riverbed. WAN optimization is a class of technology that has rapidly been adopted across enterprises in order to address the challenges of bandwidth limitations and latency over the WAN. Click here!

WHITE PAPER: Splunk

Make IT Data a Strategic Asset
This paper outlines the struggles organizations face managing silos of IT data and how, using Splunk, users are changing the way they do their jobs and elevating the role of IT in their organizations. Learn More!

Cybercrime tops Attorneys General meeting
The Federal and State government attorney generals have agreed to establish a National Cybercrime Working Group to coordinate a response to online threats, including the increasing rate of bullying. Read More

System to surgically jam electronics taking shape
Raytheon BBN has gotten $8.3 million to begin developing a sophisticated electronic system to surgically jam specific digital signals generated by everything from cell phones to GPS devices, satellites and radios.  Known as the Precision Electronic Warfare (PREW), the goal of the technology will be able to surgically disable targets in small areas on demand without hindering or disabling friendly... Read More

Faulty McAfee Update Burns IT Execs
McAfee has taken steps to appease angry customers whose systems were crippled by a faulty antivirus software update that the company distributed late last month. Read More


WHITE PAPER: MegaPath

Understanding the Value of Managed Security UTM Solutions
This Yankee Group paper describes why multiple security layers are needed to achieve comprehensive and cost-effective security solutions. Learn More

Facebook hires former Bush regulator for privacy defence
Facebook has hired lawyer Tim Muris, a former senior regulator in the Bush administration, to defend its privacy policies against government scrutiny. Read More

AusCERT 2010: Hackers, lockpickers and cops
Some of the world's greatest minds in IT security will gather in Queensland's Gold Coast for the annual AusCERT conference this month. Read More

Share Wireless Safely with Friends
USANomad asked the Answer Line forum how he can let visiting friends wirelessly access the Internet while protecting the PCs on his network. Read More


WHITE PAPER: HP

Quadruple VMs without Increasing NICs
IDC: As companies roll out blade-based virtualization deployments, many find that they have limited choices for network I/O. Virtual machines not only help bring more applications onto each server but also place additional demand on network I/O. Learn to adress these challenges. Read now.

Twitter wipes out followers to kill bug
Twitter successfully quashed a bug by temporarily eliminating the followers/following lists of all users. Read More

Firewall audit tools: features and functions
Why would anyone need firewall audit software? If you're already jugging hundreds of rules on multiple firewalls, here's what these tools can do for you. Read More

Symantec Study Mischaracterizes Linux Spam
The latest MessageLabs Intelligence Report from Symantec Hosted Services is filled with interesting and useful information regarding the current state of malware and e-mail borne threats as well as the trends over time. Of particular interest to me is the assertion in the report that "any given Linux machine is five times more likely to be sending spam than any given Windows machine." Read More

Court gives preliminary OK to $4M consumer settlement in Heartland case
A federal court in Texas has preliminarily approved a $4 million settlement of a consumer class-action lawsuit against Heartland Payment Systems Inc. over the massive data breach the payment processor disclosed in January 2009. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

15 copies of CCNP ROUTE study kits available and 15 copies of Unix and Linux System Administration Handbook up for grabs, too.Deadline May 31.

SLIDESHOWS

Geeky Weddings, Birthdays, and Funerals
If you've ever dreamed of marrying a video-game character, having your ashes put in a computer, or holding your wedding on the deck of Star Trek's USS Enterprise, you're not alone.

2010 'Geek and Tech' Summer Movie Preview
It's summer movie time again, time for the movie studios to trot out its blockbusters with explosions and all sorts of fun. Here's our picks for the favorite movies that techies and geeks (comic book fans, unite!) will be lining up for.

MOST-READ STORIES

  1. Confessions of tech hoarders
  2. Facebook hires former Bush regulator for privacy defense
  3. How to build a private cloud
  4. Wireless Gigabit spec published, gains Cisco support
  5. Wi-Fi key-cracking kits sold in China mean free Internet
  6. Hacker develops multi-platform rootkit for ATMs
  7. Review: Ubuntu Enterprise Cloud
  8. 15 cloud companies to watch
  9. Readers back Apple in Flash-on-iPhone dispute
  10. Bladeless wind turbine gains patent, now looks for lift

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: