Search This Blog

Thursday, September 23, 2010

FTC settles privacy violation claims with online data broker

How much should you spend on IT security? | Can behavioral biometrics help detect terrorists entering the U.S.?

Network World Security

Forward this to a Friend >>>


FTC settles privacy violation claims with online data broker
Online data broker US Search sold a service that claimed to lock down private records so no one else in the world could see them. The Federal Trade Commission said any such privacy claims were false and deceptive. Read More


E-GUIDE: IBM

eGuide: A New Look at BI
Craft better IT strategies, build new, targeted products and achieve operational savings. These are just some of the benefits derived from business intelligence (BI) software. This expert guide from CIO, Computerworld, InfoWorld and Network World provide an overview of recent BI trends and how to leverage its most powerful features. Learn more.

WEBCAST: Akamai Technologies

Increase Download Completion Rates
Join IDC for this live Webcast as new research on Electronic Software Delivery is revealed. Find out how to effectively monitor and deliver small and large downloads to ensure end user success and satisfaction. And because it's live, you can ask the experts questions specific to your environment. Register Today.

How much should you spend on IT security?
It may be difficult for enterprises to figure out how much they should spend on IT security, but research analyst Gartner has statistics on how much their peers are spending. Read More

Can behavioral biometrics help detect terrorists entering the U.S.?
Fingerprinting air passengers entering the United States is one counter-terrorism method used today . But the Department of Homeland Security (DHS) has another idea in the works: a behavioral biometrics monitoring system that gauges small changes in a person's body, dubbed the "fidget factor," especially in answer to a question such as "Do you intend to cause harm to America?" Read More

Twitter XSS Worm Holds Lessons for IT
The online world was all aflutter yesterday with news of a worm spreading through Twitter. The "onMouseOver" issue--which presented pop-up boxes and redirected users to porn sites--was quickly handled by Twitter, but the events that led up to it hold some valuable lessons for IT. Read More


WHITE PAPER: Iron Mountain

Email Archiving Deep Dive
Mail servers continue to deal with ballooning message volumes and management challenges. Email archiving software provides a viable solution, particularly when granular government regulations apply. Learn More Now.

Applications weakened by third-party code
The use of third-party code in applications represents a big security risk for companies, according to a study from security vendor Veracode. Read More

TSA Secure Flight: The Next TSA Privacy Threat?
If you ever intend to fly again, you will encounter yet another Department of Homeland Security (DHS) program that will be administered by the Transportation Security Administration (TSA) to ascertain you are not a terrorist. The Secure Flight program requires airlines to collect and transmit each passenger's full name, date of birth and gender at least 72 hours before a flight. Read More

FTC stuffs envelope-stuffing scammer
File this one under the anecdote "when things appear too good to be true they usually are."  The Federal Trade Commission got a district court to shut down an envelope-stuffing operation that promised consumers they could make thousands of dollars sruffing envelopes from the comfort of their own home. Read More


WHITE PAPER: Symantec

Don't Leave Your Business at Risk- Protect it Completely
The time is right for a clear assessment of your risks, and a realistic plan to address them—for your customers, your reputation, and your business future. Discover best practices for protecting your business data and the solutions available to start now by reading this guide. Read Now.

Lawsuit: Ad Network Could Be Tracking You With HTML5
HTML5 is an exciting technology with lots of potential. But one potentially insidious use has surfaced, and one group of privacy experts isn't taking it lightly. Read More

Twitter 'antibodies' help kill worm, says researcher
Social-networking style services like Facebook and Twitter have a natural defense against hardcore hackers, a security researcher said. Read More

Google report details data requests from authorities
Google has unveiled a Transparency Report, which maps how many requests for data governments across the globe have made. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

SLIDESHOWS

5 Strange Ways iPhones Die: Insurer Hears it All
What do toilets, beer and elevators have in common? They all send many iPhones to their death, says consumer electronics insurer Worth Ave. Group, which shared some unfortunate tales of iPhone disaster.

Ultimate guide to the flat data center network
The traditional three-tier network had a good run, but its age is starting to show in today's brave new world of server consolidation, virtual machines, cloud computing and 10Gigabit switches. Here's a look at where we've been and where we might be headed.

MOST-READ STORIES

  1. Oracle's "new" kernel for RHEL clone: The real truth
  2. 5 strange ways iPhones die: Insurer hears it all
  3. Was Stuxnet built to attack Iran's nuclear program?
  4. Twitter 'antibodies' help kill worm, says researcher
  5. How to hack IP voice and video in real-time
  6. Why I switched to Android: 7 BlackBerry geeks speak
  7. Fly on the wall says Apple made Newsday kill funny iPad ap ad
  8. Is Stuxnet the 'best' malware ever?
  9. Be wary of PCoIP
  10. Android handset makers are like kids peeing in their pants

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: