Friday, May 28, 2010

Sophos slams scientist 'infected' with computer virus; 10 most controversial tech stories of 2010

10 most controversial technology stories of 2010 – so far | 44 million stolen gaming credentials found in online warehouse

Network World Compliance

Forward this to a Friend >>>


Sophos slams scientist 'infected' with computer virus
Security vendor Sophos has slammed a technology experiment, which saw a British scientist infect himself with a computer virus, as "scaremongering". Read More


WHITE PAPER: IBM

A Study of CEOs and other C-level Executives
New research reveals that C-level executives feel good data protection efforts support organizational goals such as compliance, reputation, management or customer trust, but there is a lack of confidence in the ability to safeguard sensitive information. Sponsored by IBM, this paper reveals the value of data protection Click to continue

WHITE PAPER: Novell

File Management Suite
Better track and understand storage patterns, allocate and manage storage based on its relevance and value to the business, while saving money in the administration and procurement of storage resources. Learn to get a handle on the unchecked proliferation of data. Read Now

10 most controversial technology stories of 2010 – so far
digg_url = 'http://digg.com/tech_news/10_most_controversial_technology_stories_of_2010_so_far'; Everyone loves a controversial story and the technology industry has been serving them up left and right in 2010, typically featuring big names like Apple, Google and Comcast. Here's a look back at the biggest such headlines so far this year: Read More

44 million stolen gaming credentials found in online warehouse
Symantec says it has unearthed a server hosting the credentials of 44 million stolen gaming accounts -- and one of the most surprising aspects of it is that the accounts were being validated by a Trojan distributed to compromised computers. Read More

NAC: What went wrong?
After spending four months in the lab testing the 12 leading network access control products, we've come to this conclusion: Five years of hype, buzzwords, white papers, product launches, standards battles and vendor shakeouts have resulted in very little in the way of clarity. Agreement on what NAC really means and the right approach to NAC remain as elusive today as in 2005, when the first NAC products burst on the scene. Read More

Social engineering stories
Like good movies, a successful social engineering scam usually leaves both the perpetrator, and the victim, with an impression they'll never forget. We spoke to security experts about memorable social engineering stories. Read More

Facebook Answers Critics With New Privacy Controls
Facebook CEO Mark Zuckerberg today unveiled his company's revamped privacy tools in front of a corps of tech journalists that included organizers of last year's Facebook Redesign Revolt, PCWorld editors who drafted a Bill of Rights for Facebook Users, and many of the company's fiercest critics of its privacy policies. Read More


E-GUIDE: Compuware

5 Tips for Getting the Best Web App Performance
This eBook, compiled by Network World, explores the pressing issues, from dealing with outages and evaluating performance monitoring services, to the impact of virtualization. Get expert tips to optimize your Web apps. Learn More Now

Symantec readies Norton security, storage apps for Android, iPhone smartphones
Symantec's Norton division today launched its "Norton Everywhere" initiative aimed at bringing security protections and cloud-storage access to the Google Android and Apple iPhone smartphones. Read More

Man Infects Himself with (Computer) Virus
We are one step closer to the future: a British scientist has become the first human being to contract a computer virus. Read More

Hackers will keep hammering Facebook, say researchers
Attacks targeting Facebook users will continue, and could easily become even more dangerous, a security researcher said today. Read More

Shavlik offers 'cloud patching' with free service
Patch management company Shavlik is offering small networks of 10 or fewer PCs access to a new online patch management service at no cost. Read More

US needs plan for online terrorism recruiting, expert says
The U.S. government lacks a plan to counter terrorist recruiting efforts online, even though such efforts by jihad groups are growing, one terrorism expert told U.S. lawmakers. Read More


WHITE PAPER: Fluke Networks

Ethernet Performance Metrics
Ethernet performance measurement can help. Various metrics can quantify and characterize performance. Test plans can be written to satisfy varying organizational objectives. This white paper will describe advancements in field measurement of end-to-end Ethernet performance. Read More!

Internet Privacy Worries Are Eroding, Pew Finds
Facebook chief executive Mark Zuckerberg's vision for a less private Internet is slowly coming to fruition, a survey by the Pew Internet & American Life Project suggests. Read More

The 10 Best Hacks of 2010 (So Far)
In honor of Geek Pride Day, Towel Day, and the Glorious 25th of May, here are ten of our most favorite hacks featured in Geek Tech in the last five months, running the gambit from phone, car, and CPU mods. Read on for some great moments in geek! Read More

Sneaky browser 'tabnapping' phishing tactic surfaces
All of the major browsers on Windows and Mac OS X are vulnerable to a sly new attack tactic dubbed "tabnapping" that can dupe users into giving up passwords by secretly changing already-open browser tabs. Read More

Cisco's NAC goes off track, customers taken aback
As the most important supplier of network infrastructure to enterprises, Cisco's NAC products are a natural point of curiosity for network managers. Unfortunately, though, Cisco's approach to NAC has been riddled with in-fighting, false starts, delayed product releases, and a good dose of chaos and confusion. Read More

McAfee to acquire Trust Digital to further mobile security
McAfee Tuesday said it's signed an agreement to acquire privately held Trust Digital as part of its strategy to expand into the mobile security arena, the enterprise sector in particular. The acquisition price for Trust Digital was not disclosed. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

15 copies of CCNP ROUTE study kits available and 15 copies of Unix and Linux System Administration Handbook up for grabs, too.Deadline May 31.

SLIDESHOWS

40 days of summer (gadgets)
Summer's here and the time is right for looking at gadgets to make the summer days and nights go by easier or more fun at least. If you're going outside to enjoy the sun, hitting the road for a long road trip to a vacation destination, or just staying at home for the perfect "staycation", here are 40 devices or apps we think you'll like.

What if tech companies owned the Wonders of the World?
In this slideshow, we'll take a look into a future where broke governments are forced to sell their most treasured landmarks to the world's richest nerds.

MOST-READ STORIES

  1. Scientist 'infected by computer virus' catches publicity fever
  2. Six misconceptions about cloud apps
  3. WWDC Preview: Apple waging three big fights
  4. Sneaky browser 'tabnapping' phishing tactic surfaces
  5. Winner and still champ, DoNetNuke
  6. Wi-Fi vendors face off
  7. Cisco powers up router, switches for smart grids
  8. 44 million stolen gaming credentials found in online warehouse
  9. The 10 best hacks of 2010 (so far)
  10. Steve Ballmer as emoticons

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment