Search This Blog

Friday, May 21, 2010

Symantec's $1.28B VeriSign gambit draws mixed reviews; Your browser has fingerprints

EFF: Forget cookies, your browser has fingerprints | Our growing security quagmire

Network World Compliance

Forward this to a Friend >>>


Symantec's $1.28B VeriSign gambit draws mixed reviews
Symantec's stunning decision to put $1.28 billion in cash on the table to buy most of the security services within VeriSign is a gambit that is drawing mixed reactions in the analyst community, but Symantec insists the VeriSign certificate and authentication services are key elements in what's shaping up to be one of the biggest self-transformations ever in the security industry. Read More


RESOURCE COMPLIMENTS OF: IBM

Try Rational AppScan
Download Today! IBM Rational® AppScan® Standard Edition is a Web application security testing tool that automates vulnerability assessments, significantly reduces costs associated with manual vulnerability testing and helps to protect against the threat of cyber-attack by automating security analysis to detect exploitable vulnerabilities. Click to continue

WHITE PAPER: Oracle

Oracle Accelerate - Not Just Smart But Timely
This video highlights the Oracle Accelerate program - a group of pre-configured, tested solutions that combine Oracle enterprise applications and rapid implementation tools with industry-specific bundles. The program reduces the time, complexity and cost of deploying Oracle and is implemented by highly trained partners. Learn More.

EFF: Forget cookies, your browser has fingerprints
Even without cookies, popular browsers such as Internet Explorer and Firefox give Web sites enough information to get a unique picture of their visitors about 94 percent of the time, according to research compiled over the past few months by the Electronic Frontier Foundation. Read More

Our growing security quagmire
Information security was always an esoteric field but with personal computing came personal security issues, culminating in the identity theft problem that concerns even the most techno-phobic of consumers. It's about to get much worse. Read More

Wal-Mart pushing for chip-and-pin payment cards in U.S.
Wal-Mart wants to see chip-and-pin payment cards adopted in the United States in effort to better secure financial transactions, according to a report from the Smart Card Alliance event this week in Scottsdale, Ariz. Read More

Cloud-based identity management gets a boost
Giving network managers a way to provide access, single sign-on and provisioning controls in cloud-computing environments got a boost today from both Novell and a much smaller competitor, start-up Symplified. Read More

FTC targets privacy concerns related to copy machines
The U.S. Federal Trade Commission has begun contacting copy machine makers, resellers and office-supply stores about privacy concerns over the thousands of images that can potentially be stored on the machines' hard drives. Read More


WHITE PAPER: Adobe

Close the Web 2.0 Communications Gap
Web 2.0 tools have yet to reach critical mass and broad user adoption. This Forrester report identifies the key Web 2.0 gaps and offers advice to: Build a framework that extends email, Upgrade document-based data collection, and Improve email and document exchange security. Read More

Harnessing log data to meet PCI DSS requirements
The good news is that Payment Card Industry compliance has been on the rise. As of October 2009, 97% of Level 1 merchants and 94% of Level 2 merchants were already compliant, according to Visa. Read More

Managing the private encryption keys to the kingdom
At its core the PCI Data Security Standard is nothing more than a series of guidelines that constitute security best practices. But companies that institute programs to better protect cardholder data can also leverage and extend these efforts throughout their business, ensuring that other sensitive customer, employee and partner data is better protected. Read More

Rapid7 launches Metasploit Express
Rapid7's integration of Metasploit takes a new turn this week, with the SOURCE Boston unveiling of a new pen-testing tool. Read More

Quantum key security hacked for first time
An important weakness has been discovered in the technology of quantum key distribution (QKD), which is increasingly being used by military and government to secure sensitive communications. Read More

Facebook considers changing privacy settings
Facebook is considering simplifying its privacy settings, following a backlash from users. Read More


WHITE PAPER: Fluke Networks

Troubleshooting Application Problems
This comprehensive 94 page guide is a how-to resource handbook for network engineers. Learn the fundamentals of how applications work, how they flow, where applications fail and best practices and methodologies for troubleshooting network and application problems. Click here!

Test Your Facebook Privacy Settings: Here's How
We've been talking about Facebook's privacy mess for days now. We all know the story, right? Privacy controls are broken, everyone's getting irritated, Facebook's not too concerned, blah flippidy-freakin' blah. Read More

Facebook fixing embarrassing privacy bug
Facebook is fixing a Web programming bug that could have allowed hackers to alter profile pages or make restricted information public. Read More

LifeLock CEO said to be victim of identity theft 13 times
A CEO who publicly posted his Social Security number on billboards and TV commercials as part of a campaign to promote his company's credit monitoring services was the victim of identity theft at least 13 times, a news report says. Read More

Microsoft touts Hotmail security adds; users complain of account hacks
Microsoft will beef up security in the revamped Windows Live Hotmail, including tying a user's account to a specific PC, a company executive said today. Read More

Skype worm no cause for panic, says expert
Security research firm Bkis earlier this month warned of a vicious virus targeting both Skype and Yahoo! Messenger. BKIS said in a blog post the attack involved inserting malicious URLs into chat windows with sophisticated social engineering hooks. Read More

Google Wi-Fi Data Snooping: An FAQ
Google is cleaning up its mess after the company says it mistakenly collecting browsing data from unencrypted Wi-Fi networks as part of its Street View project. The search giant said on Monday that it had deleted all Wi-Fi data collected in Ireland at the request of the Irish Data Protection Authority. The destruction of incorrectly obtained data in Ireland was confirmed by iSec Patners Inc., an independent security consulting firm. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

15 copies of CCNP ROUTE study kits available and 15 copies of Unix and Linux System Administration Handbook up for grabs, too.Deadline May 31.

SLIDESHOWS

Car hackers can kill brakes, engine, and more
Researchers at the University of Washington and UC San Diego have taken a close look at the computer systems used to run today's cars and discovered new ways to hack into them, sometimes with frightening results.

20 Crazy Concept Phones
From snake phones to handsets that look like hockey pucks, these hopelessly impractical devices are the coolest-looking phones you'll never want to own.

MOST-READ STORIES

  1. I could license you to use this software, but then I'd have to kill you
  2. Black duck eggs and other secrets of Chinese hackers
  3. FTC takes out notorious porn- and botnet-spewing ISP
  4. Standing-room only for HTML5
  5. 8 in 10 browsers leave identifiable 'fingerprints,' EFF warns
  6. My makeshift 3G iPad
  7. LifeLock CEO said to be victim of identity theft 13 times
  8. Symantec to buy VeriSign's authentication business
  9. The Android surge goes global
  10. Win 7 helps Microsoft hit record customer satisfaction score

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: