Wednesday, August 25, 2010

Survey sheds light on employees and data loss

Microsoft Binary Planting Bug: What You Need to Know | Nasty auto robocaller forced to pay $2.3M, sell Mercedes

Network World Security: Identity Management

Forward this to a Friend >>>


Survey sheds light on employees and data loss
One of the best headlines I've ever seen, at least for a press release, crossed my inbox recently: "SailPoint survey shows employees are more apt to take company data than a stapler." Read More


WEBCAST: Oracle

Getting Started with Identity Compliance
The Burton Group's, Kevin Kampman, provides an overview of the latest technology for identity management. He'll help you sift through key, mandatory requirements and features and functionality that can wait. Kevin offers guidance on how you can get a 360-degree view of users' access and behavior, best practices and a real-world implementation. View Now.

WHITE PAPER: MessageLabs

The Wild, Wild Web: How to Ensure 360-Degree Border Security
Managing the security and availability of Web, email, and IM is complex. This paper will discuss the modern threat of blended attacks from web, email and IM. and highlight how a comprehensive hosted solution by Symantec Hosted Services can secure your networks from these threat vectors. Read Now

Microsoft Binary Planting Bug: What You Need to Know
Microsoft released a security advisory in response to a potential exploit, known as DLL preloading or binary planting, which has been found to impact hundreds of third-party Windows applications--possibly including software developed by Microsoft itself. Unfortunately, this isn't a simple Windows vulnerability that Microsoft can fix with its next patch release, so it's important that you understand the flaw and what is at risk, as well as what you can do to protect your systems. Read More

Nasty auto robocaller forced to pay $2.3M, sell Mercedes
At least this time one of these scammers is actually being hit in the wallet. Under a settlement with the Federal Trade Commission one of the telemarketers who blasted consumers with millions of illegal auto warranty robocalls last year will pay approximately $2.3 million in redress and give up his Mercedes. Read More

iTunes Scam: How to Protect Yourself
In recent weeks, more and more iTunes users have been reporting fraudulent activity on their Apple accounts, reporting hundreds or even thousands of dollars worth of bogus purchases. With the reports of this type of fraud on the uptick in recent weeks, many users have been quick to blame Apple or PayPal, as many of the affected iTunes accounts were linked to PayPal accounts. Read More


WHITE PAPER: Zenprise

10 Enterprise iphone OS Security Best Practices
In this white paper, we identify ten best practices that you should consider implementing immediately to best support iPhone OS devices. Read More

Rustock botnet ditches encryption to ramp spam
The Rustock mega-botnet appears to have ditched the experimental use of TLS (transport layer security) to obscure its activity, Symantec has reported. Read More

Worried About ID Theft? Join the Club
Nearly two-thirds of Americans are concerned that information about their bank accounts, credit cards and identity may be stolen from their computers, according to a survey released today by a provider of identity theft protection services. Read More

Hackers bait Zeus botnet trap with dead celeb tales
Spam messages touting fictional tales of celebrity deaths are prompting users to open attachments that are adding their machines to the Zeus botnet. Read More


WHITE PAPER: Xerox

KeyCorp Transforms document services in the office.
KeyCorp, a leading financial services company, reduced printing costs, decreased document devices used, and standardized equipment service and support while promoting supplier diversity and environmental responsibility. Watch the Video.

Malicious Spam Exploits Fake Celebrity Deaths
Miley Cyrus is fine. Beyoncé did not perish in a plane crash. Brad Pitt did not meet an untimely demise. Everyone take a deep breath and--whatever you do--do NOT click on any file or link that arrives as a part of a sensational e-mail declaring a celebrity death. Read More

Philadelphia not showing any brotherly blogger love: City wants $300 license fee
The City of Philadelphia has found a sure fire way to piss off the entire Internet community by demanding a $300 "business privilege license" for local bloggers. Specifically, bloggers can pay $300 for a lifetime license or $50 per year. Do we need a Federal law for electronics recycling? Oh yeah, and the city wants taxes on any profits the blog might have made - that would be in addition to any... Read More

Windows DLL load hijacking exploits go wild
Less than 24 hours after Microsoft said it couldn't patch Windows to fix a systemic problem, attack code appeared Tuesday to exploit the company's software. Read More

Foursquare Privacy Basics: 5 Tips to 'Secure' Your Check-Ins
It's hardly practical to believe there are "right" and "wrong" ways to employ social networking services like Twitter or Facebook. However, there are "smart" and/or "safe" methods of use, especially for location-based services (LBS) that identify your whereabouts at a given time, like popular social network/LBS Foursquare. Read More

Visa offers new guidance on securing payment applications
Visa this week added new best practices for makers of payment applications and those using them. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

SLIDESHOWS

Cloud storage lives up to the hype
We tested five cloud-based storage services under real-world conditions. We set up accounts, connected with the vendor storage network, uploaded and downloaded files, measured performance and analyzed cost structures. Our conclusions are that cloud-based storage can save you money. And cloud-based storage can be fast. However, there are still security concerns that you need to be aware of.

Wireless networks and mobility quiz
iPhones and other handhelds bought for home use are infiltrating corporate networks, but there's a host of other wireless technologies that comprise a wave of mobile computing that is creating sweeping changes in business infrastructure. How well versed are you in the technical and not-so- technical details?

MOST-READ STORIES

  1. Zero-day Windows bug problem worse than first thought
  2. Linux community finally fixes 6-year-old critical bug
  3. Intel-McAfee deal baffles security analysts
  4. Android 2.2: How to install Flash on Froyo
  5. Intel buys McAfee: My two cents
  6. Microsoft won't showcase Hyper-V at VMworld
  7. Cameron Diaz could wreck your PC, McAfee warns
  8. Decorate with Linux
  9. Intel to buy McAfee in $7.68 billion blockbuster
  10. Does Intel buying McAfee have any impact on open source

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment