Search This Blog

Tuesday, November 02, 2010

Is it legal to use Firesheep at Starbucks?

Adobe Reader: Will New Version Block Hackers or Tempt Them | Air Force bounces Windows XP, goes all-in for Windows 7

Network World Security

Forward this to a Friend >>>


Is it legal to use Firesheep at Starbucks?
People using the Firesheep add-on may be breaking federal wiretapping laws, legal experts said Read More


WHITE PAPER: HP

Framework for Securing Virtualized Data Centers
Does the broad adoption of virtualization make network security easier or more difficult to achieve? While responses to this question are still highly varied, one thing is certain: most companies still have no clear and definite security policy for their virtual environments. Understand the real need for virtualized security solutions. Read Now

WHITE PAPER: Tripwire

Narrow the Breach-to-Detection Gap for Better Security
What's more important, security or compliance? Most IT shops are focused on compliance but breaches are still happening. A recent study by Verizon Business concludes that evidence of those breaches tends to be right there in log files. Read More Now.

Adobe Reader: Will New Version Block Hackers or Tempt Them
Here's a distinction no software company craves: For two quarters running, Adobe's popular Acrobat and Reader software have been the favorite target of hackers around the globe. According to Symantec's quarterly threat assessment, attacks related to PDF usage accounted for 36 percent of malicious activity in the most recent quarter and 57 percent in the preceding three months. Read More

Air Force bounces Windows XP, goes all-in for Windows 7
The US Air Force said it has begun a service-wide upgrade of operating systems to Windows 7, the plan to complete the upgrade across the service by December 2011. Read More


WHITE PAPER: F5 Networks

Gartner: Load Balancers Are Dead
Get Gartner's take on: * Which vendors are leading the ADC market * Key recommendations on what you should do today * How to find a feature-rich ADC View the Gartner report, compliments of F5 Networks! Read now!

Antivirus scanning becoming inadequate, says Webroot CEO
US antivirus vendor Webroot has bought UK-based Prevx in an acquisition that looks like the latest symptom of the growing dissatisfaction among security companies with the current signature-based scanning model for detecting malware. Read More

The CIA And The Encrypted Enterprise
Pervasive encryption demand network key management services, a solid architecture, and lots of thinkingThe international horse show wasn't the only event in Washington DC this week, I participated in the Virtualization, Cloud, and Green Computing event in our nation's capital this week. One of the guest speakers was Ira "Gus" Hunt, CTO at the CIA. If you haven't seen Gus speak, you are missing something. He is very strong on the technical side and extremely energetic and entertaining. Read More


WHITE PAPER: Quantum Corporation

Why Organizations Need LTO-5 Today
For years, tape storage systems have played a key role in efforts to store data for backup and retrieval, archiving, and contingency planning purposes. More recently, tape has been called on to help preserve and safeguard data to meet data retention laws and regulations. Read More

Utilities' IT systems unready for smart grid intelligence
Electricity companies' IT systems are not yet ready to support smart grid intelligence, a survey has found. Read More

Facebook Nails Developers Leaking User Data
Remember all the hullaballoo in October over The Wall Street Journal's report that third-party Facebook developers were leaking user information to Internet tracking firms? Turns out those privacy concerns may have been justified. Facebook recently acknowledged that some developers were deliberately selling user IDs (UIDs) to data brokerage firms. UIDs are uniquely identifying numbers that can be used to find your Facebook profile and any profile information you have made publicly available. Read More

Koobface Mac security threat: Intego reveals more details
Intego has revealed more details of the potential security threat from the Koobface Trojan horse. Read More

Symantec report notes increase in cyber attacks
There was no let up in so-called targeted attacks by cyber criminals this month across all sectors and geographies, according to the October 2010 MessageLabs Intelligence Report of Symantec. While some types of attacks saw marginal decreases, the report noted that the threats remain. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Goodies from the Subnets
We've got SharePoint 2010 training for up to three people from Webucator up for grabs. There's an iPad available, too. Enter to win one!

SLIDESHOWS

The Google Android Quiz
Android OS, with its openness, readily developed applications and flexibility has anchored a new wave of mobile devices that are rapidly gaining popularity. Here's a quiz about the operating system, its devices and history to see how well you really know it. Keep score and rank yourself at the end.

25 hot products from new IT companies
Network World's 25 New IT Companies to Watch are building a broad array of new IT products for the cloud computing and virtualization age. Here's a look at the 25 new IT companies and the technologies they're offering.

MOST-READ STORIES

  1. Steve Jobs' business card from 1979
  2. Is it legal to use Firesheep at Starbucks?
  3. Enterprises: We'll run Windows XP even after retirement
  4. Will the next wireless infrastructure be humans wearing radios?
  5. Hey, you with the open Wi-Fi: You're an idiot
  6. Mastering the art of the Cisco Kool-Aid keg stand
  7. 11 uses for an old PC
  8. How to improve WAN performance
  9. Are your skills ready for the opportunities in networking?
  10. Cisco management software vulnerable

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: