Search This Blog

Wednesday, May 05, 2010

US Treasury Web sites hacked, serving malware

Report blames IT staff for school Webcam 'spying' mess | 10 hot energy projects that could electrify the world

Network World Security

Forward this to a Friend >>>


US Treasury Web sites hacked, serving malware
Three Web sites belonging to the U.S. Department of the Treasury have been hacked to attack visitors with malicious software, security vendor AVG says. Read More


WHITE PAPER: Oracle

Business Agility Strategies For Midsize Organizations
Midsize businesses have enormous IT pressures: building an infrastructure that is flexible, designed to accommodate rapid growth and meets compliance challenges with resources nowhere near larger enterprises. This video whitepaper explains how Oracle is delivering applications specifically for midsize businesses. Learn More

WHITE PAPER: Brocade

Deployment Strategies for 802.11n
Many organizations are looking to reap the benefits of the new 802.11n standard, but what is the best way to deploy wireless technology while minimizing costs? Learn why understanding the "Three Cs"-context, coverage, and capacity-is critical for choosing an optimal network implementation strategy. Read More!

Report blames IT staff for school Webcam 'spying' mess
The IT department of the Pennsylvania school district accused of spying on students using their school-issued laptops took the brunt of the blame in an independent report released Monday. Read More

10 hot energy projects that could electrify the world
There are thousands of projects underway to change the way the U.S. and the world produces and uses energy. Start-ups are looking to harness the world's ocean waves and build advanced fuel cell that produce data center-class electricity. Read More

NASA takes first steps to build new heavy-lift space rocket
While some in congress may grumble, NASA has officially begun its search for a next-generation rocket capabl Read More


WHITE PAPER: Riverbed

Overcome Two Key Challenges with Virtualization
How do you accelerate virtualization for your enterprise - and take IT flexibility and cost savings to the next level? Start by downloading this whitepaper from Riverbed. WAN optimization is a class of technology that has rapidly been adopted across enterprises in order to address the challenges of bandwidth limitations and latency over the WAN. Click here!

Internet censorship in China: The conventional view
No one doubts that the government of the People's Republic of China is one of the most repressive regimes on the planet, nor that its repression extends to pervasive interference with its citizens' access to information at all levels, including blocks on Internet-mediated transmission from outside the country and suppression of internal news circulation by indigenous reporters. Read More

Wi-Fi key-cracking kits sold in China mean free Internet
Dodgy salesmen in China are making money from long-known weaknesses in a Wi-Fi encryption standard, by selling network key-cracking kits for the average user. Read More

Fast-spreading P2P worm targets USB drives
A crafty new P2P worm appears to be spreading quickly among users of a range of popular file-sharing programs. Read More


WHITE PAPER: Splunk

Make IT Data a Strategic Asset
This paper outlines the struggles organizations face managing silos of IT data and how, using Splunk, users are changing the way they do their jobs and elevating the role of IT in their organizations. Learn More!

Keep Your Personal Data Off the Market
In 2003, author and security pioneer Simson Garfinkel conducted a study of data he found on second-hand hard drives. On eBay, Garfinkel bought the hard drive from an old ATM machine; it held 827 bank account PINs. Another drive he purchased on eBay had previously been owned by a medical center and contained information on 31,000 credit card numbers. Read More

LoveBug worm hit 10 years ago during a simpler time
When the LoveBug worm hit 10 years ago, it was a different time when people believed admirers were really reaching out to say "I love you", personal firewalls were turned off by default and executable attachments weren't blocked at e-mail gateways. Read More

Lawmakers unveil online privacy legislation
Two U.S. lawmakers have released a draft bill that would require companies that collect personal information from customers to disclose how they collect and share that information, but several privacy and consumer groups said the proposal would legalize current privacy violations online. Read More

Legal disclaimers in Exchange 2010: letting the lawyers insert themselves
Let's talk about how to manage disclaimers in Exchange 2010. Disclaimers (aka lawyer-speak) are normally used to denote some form of limit or scope for the rights and obligations for parties in a legally-recognized relationship. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

15 copies of CCNP ROUTE study kits available and 15 copies of Unix and Linux System Administration Handbook up for grabs, too.Deadline May 31.

SLIDESHOWS

Geeky Weddings, Birthdays, and Funerals
If you've ever dreamed of marrying a video-game character, having your ashes put in a computer, or holding your wedding on the deck of Star Trek's USS Enterprise, you're not alone.

2010 'Geek and Tech' Summer Movie Preview
It's summer movie time again, time for the movie studios to trot out its blockbusters with explosions and all sorts of fun. Here's our picks for the favorite movies that techies and geeks (comic book fans, unite!) will be lining up for.

MOST-READ STORIES

  1. Beware the black market rising for IP addresses
  2. Speedier phones still can't keep up with networks
  3. 5 technology security myths, busted
  4. Vintage tech ads: The 15 funniest videos
  5. Dear Apple: Please make 'magical' disappear from iPad pitches
  6. U.S. Air Force phishing test transforms into a problem
  7. Adobe: 'Not you, too, Microsoft!'
  8. Google invests in firm that tries to predict the future
  9. Out-of-this-world Apple iPad 3G has 5 antennas
  10. Cisco, others dance around 40G Ethernet for data centers

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: