Friday, July 30, 2010

Legal wiretap mechanisms may be open to abuse within ISPs

  B is for Botnets | Beauty Shots: Technology to Drool Over

 
  Network World Daily News PM

Forward this to a Friend >>>


Legal wiretap mechanisms may be open to abuse within ISPs
The built-in mechanism that lets many Internet providers tap communications for law enforcement agencies is susceptible to abuse by insiders who work for the ISPs, Black Hat 2010 was told. Read More
 


REPORT: Riverbed

Gartner: Magic Quadrant Report
Riverbed positioned in Leaders quadrant of 2009 Gartner Magic Quadrant for WAN Optimization Controllers. In this report, Gartner helps organizations interested in WAN Optimization Controller capabilities truly understand their options. Read now!

WEBCAST: Accelops

Why Private Clouds May Prevail
Cloud computing's perceived challenges of security, visibility and management may give the upper hand to private clouds. Join Yankee Group for this Webcast that discusses how to ensure you deploy a cloud that meets your organization's security and compliance needs. View Now

B is for Botnets
Today Our Cool Tools Blogger Keith Shaw launched a new video series, "The ABCs of IT." It stars I.T. Jinglehopper (but Keith says you can call him Neal for short) and his sidekick/intern Jackson. The two will explain the alphabet of IT terms and hopefully provide some entertainment along the way. Read More
 

Beauty Shots: Technology to Drool Over
Take a gander at some of the most gorgeous tech of the year from the 2010 Industrial Design Excellence Awards. Read More
 

Microsoft to issue patch for dangerous USB rootkit hole
Microsoft on Tuesday will release a rare out-of-band patch to fix the highly dangerous zero-day vulnerability that has caused multiple researchers to issuing warnings earlier this month. The patch will be for all supported versions of Windows and will require a restart. Read More
 

AirTight defends Wi-Fi WPA2 'vulnerability' claim
AirTight is defending its claim to have uncovered a vulnerability in the 802.11 specification, and to have mounted an undetectable insider attack based on it. Some have dismissed it as a "publicity stunt." Read More
 


WHITE PAPER: Cisco

Security in the Cloud
This technology dossier contains four papers that address security considerations in cloud computing. It includes IDG Research results on what IT managers have to say about cloud security, executive viewpoints on blending cloud solutions to optimize security, and a strategy paper that addresses protecting data. Read now!

FBI rings organizers over Defcon contest
A Defcon contest that invites contestants to trick employees at U.S. corporations into revealing not-so-sensitive data has rattled some nerves. Read More
 

How business is putting the iPad to work
When Steve Jobs unveiled the iPad in January, he pitched it mostly as a consumer device--a relaxation tool people would use to read books, play games, watch video and peruse family photos. But Michael Kanzleiter and his colleagues at Mercedes-Benz Financial saw something else: A better way to sell cars. Read More
 

News podcast: Network World 360
Microsoft is in the process of tuning Windows 7 to work on slate PCs, according to to CEO Steve Ballmer. Also, Google's search engine in China appeared to have been blocked on Thursday night, but was up and running again by Friday morning local time. (2:25) Read More
 

Open source web apps often insecure, new tool discovers
Security company Qualys has released a new open source tool, BlindElephant, which can accurately fingerprint web applications down to version level in order to better manage the security issues which now plague such software. Read More
 

Security firm Sourcefire gaining financial strength
Sourcefire, a 10-year-old firm specializing in intrusion detection and prevention, Thursday announced increased year-over-year second quarter revenue and earnings and predicted an even better third quarter. Read More
 

Cisco Q4 looking good
Cisco fourth quarter sales are ahead of expectations, according to investment firm Oppenheimer & Co. Read More
 

Facebook, nannying, and objectives
Gibbs ponders the problems with employees and social networking and suggests that nannying won't cut it. Read More
 

Smartphones, tablets seen boosting mobile health
Smartphones, tablet PCs and other wireless devices are poised to play a greater role in health care as doctors and patients embrace the mobile Internet, panelists at a mobile health technology conference in Boston said Thursday. Read More
 

 
 
 

Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

SLIDESHOWS

Mobile deathmatch: Apple iOS 4 vs. Android 2.2
Apple's iOS has been wowing users for four years in the iPhone and now the iPad. Available in smartphones and now tablets from various vendors going on two years, Google's Android has proven itself to be a strong contender that has the only real chance to surpass iOS.

15 summer vacation ideas for geeks
From Star Trek and Space Camp to baseball minutiae, vintage video games, anime, pirates, Harry Potter and They Might Be Giants, there's a vacation option for any type of geek this summer.

MOST-READ STORIES

  1. 'Unhackable' Android phone can be hacked
  2. ATM hack gives cash on demand
  3. Black Hat gets its video feed hacked
  4. Happy SysAdmin Day (despite the pay)
  5. FBI rings organizers over Defcon contest
  6. WPA2 vulnerability found
  7. Microsoft's 2010 software 'most complicated lock-in decision in years'
  8. Microsoft: Gmail like a Jaguar with 'vinyl seats'
  9. Bad guys could read RFID passports at 217 feet, maybe more
  10. New Zealand pizza lovers suffer information theft from Hell

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment