Search This Blog

Monday, August 16, 2010

Heartland denies systems involved in new data breach

Tool takes aim at ad attacks | Report: Microsoft Cut Privacy Features to Sell Ads in IE8

Network World Security

Forward this to a Friend >>>


Heartland denies systems involved in new data breach
Heartland Payment Systems, which last year suffered the largest-ever data breach involving payment card data, is downplaying reports out linking the payment processor to a data breach at a restaurant chain in Austin, Texas. Read More


WHITE PAPER: NetApp

ESG Report: Driving storage efficiency in SAN environments
This ESG paper outlines the considerations for architecting an efficient SAN data storage infrastructure with a focus on the NetApp solutions for increased utilization, improved performance and streamlined protection to reduce operational costs. Read More!

WHITE PAPER: Qwest

Manage Complexity, Cost and Compliance
To outsource or not to outsource IT security—that is the question for enterprises as they face increasingly complex cyber threats. Managed security services can help organizations alleviate the cost and complexity of proactively securing the IT infrastructure. Read Now.

Tool takes aim at ad attacks
WASHINGTON, DC --Web advertisements are one of the more pesky ways malicious  hackers have been using to steal all manner of private information or deliver other sorts of malware. One of the worst examples of this activity was last year's New York Times.com attack ad.  Read More

Report: Microsoft Cut Privacy Features to Sell Ads in IE8
Privacy by default, wouldn't that be a nice change? Microsoft's IE development team had designed innovative privacy features that would have been turned on by default to effectively help users avoid being tracked online. Sadly, as reported by the Wall Street Journal, Microsoft cut the IE8 privacy features to sell ads. Read More


WHITE PAPER: Websense

Seven Criteria for Evaluating SaaS
The right Security-as-a-Service solution can perform reliably and effectively and deliver the flexibility and control associated with on-premise solutions — at a significantly lower cost — without compromising privacy and security. Read More

The DNSSEC Opportunity
DNSSEC is nothing new. The initial RFC was written in 1997 and the first specification was published in 1999. In spite of these efforts, secure DNS languished during the early 2000s as it wasn't a requirement for most organizations. Read More

Big Brother's Creepy Little Brother Snoops as Productivity Tool
Read More


WHITE PAPER: Qwest

Five Network Security Threats
Discover the five most costly network security threats and see how you can protect your business with a layered security approach. Read Now.

Measure and manage the risk inherent in your IT infrastructure
You've got a limited budget to spend on IT security measures. Wouldn't it be nice to have an advisor tell you precisely how to apply your resources to improve the security of your infrastructure and reduce the inherent risks to your business? Prevari's Technology Risk Manager uses predictive analytics to show you your risk level and what you can do to mitigate the risks. Read More

In an emergency, would you tweet for help?
In an emergency would you dial 911 or would you turn to Twitter and Facebook for help? You might be surprised by the results of a new Red Cross survey. Read More

Apple plugs critical iPhone jailbreak holes
Apple today patched the two vulnerabilities used to jailbreak Apple's newest iOS 4 operating system, bugs that security researchers warned could be used to hijack iPhones, iPod Touches or iPads. Read More

Google CEO Schmidt: No Anonymity Is The Future Of Web
No anonymity is the future of web in the opinion of Google's CEO Eric Schmidt. He said many creepy things about privacy at the Techonomy Conference. The focus of the conference was how technology is changing and can change society. Schmidt's message was that anonymity is a dangerous thing and governments will demand an end to it. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

SLIDESHOWS

Supersize your WAN
Dual-WAN routers have come a long way. WAN connections are easier to establish, and all units we tested have configurable load balancing. The performance increase, not to mention the redundant Internet connections that all but guarantee uptime, should put these dual-WAN routers at the top of the shopping list for every small business that needs a router.

The recent history of governments vs. the Internet
Since the Web makes it far easier to access information than ever before, governments have had a harder time keeping the lid on information they don't want the public to consume and have often found themselves butting heads with tech companies who deliver Internet services or content. Here are some doozies.

MOST-READ STORIES

  1. Dual-core smartphones on the horizon
  2. Stupid data center tricks
  3. Smartphone free-for-all: BlackBerry Torch vs. Droid 2 vs. Epic 4G
  4. HP hit with lawsuit over Hurd's departure
  5. 'WiMAX 2' set to be finalized in November
  6. GNOME chief 'embarrassed' by lack of free software Web services
  7. Workarounds: 5 ways employees try to access restricted sites
  8. Microsoft's 2010 software 'most complicated lock-in decision in years'
  9. Eight campus-ready hard drives
  10. Revisions to credit card security standard on the way

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: