Friday, December 17, 2010

Apple iPhone, iPad secrets part of FBI insider info theft bust

Hackers get Ubuntu Linux booting alongside Google's Chrome OS | OpenBSD back door claim now in doubt

Network World Security


TOP STORY: Apple iPhone, iPad secrets part of FBI insider info theft bust
FBI/DOJ allege insider info passed along from Apple, Dell and AMDThe FBI and Department of Justice today busted four current and former executives from a variety of companies - Dell, AMD, Flextronics and Taiwan Semiconductor Manufacturing Company - and charged them with insider trading.  The information was used to bolster investment opportunities as part of their consultant gigs at investment firm Primary Global Research.  A fifth defendant has already been charged... Read More

E-BOOK: Get the "Next-Generation Firewalls for Dummies" Book (Palo Alto Networks)
This book provides an overview of next-gen firewalls. Get your copy to find out: How Enterprise 2.0 applications create new risks for your organization? Why traditional firewalls can't protect your network? How next-generation firewalls stand apart from other security solutions? Click to continue

Hackers get Ubuntu Linux booting alongside Google's Chrome OS
Dual-booting on Chrome OS? Yes, but not for the faint of heartI've been testing out a prototype of Google's Chrome OS laptop for about a week now, and while I love certain things about the device my mind keeps coming back to the fact that it would be so much nicer if it could boot a "real" operating system as well. Read More

OpenBSD back door claim now in doubt
The claim that the FBI planted a backdoor in OpenBSD a decade ago has been flatly denied by developer protagonists named as having been involved in the conspiracy in an email sent to OpenBSD founder, Theo de Raadt. Read More

WHITE PAPER: The Three Ps of Evaluating Managed Network Services (Qwest)
To reduce costs and keep IT resources focused on the core business, more organizations are choosing to outsource network management. To deliver on this promise, it's essential to choose the right service provider. This in-depth report explores the key considerations, including solution portfolio, partnerships and processes. Read now!

WikiLeaks and Cyber Security
How could this have happened and what does it say about cyber security vulnerabilities?There's been a lot written about WikiLeaks over the past few weeks -- some of it fair and some a bit off base. No question that there was a security breach related to classified documents ending up on WikiLeaks but it is important to dig a bit further to define what may have gone wrong. Here are the elements of security involved and where a breakdown may have occurred: Read More

US Dept. of Commerce: New online privacy rules needed
The U.S. Department of Commerce recommends a new privacy bill of rights and an enforceable privacy code of conduct for online firms. Read More

WHITE PAPER: Eleven Habits for Highly Successful BPM Programs (IBM)
This guide outlines 11 habits for utilizing BPM effectively. Learn how to set up and manage a successful BPM program for company-wide process improvement. Prepare your organization for BPM success with the 11 tips in this paper. Read Now

More censorship, data breaches and devices: Security predictions for 2011
This past year has been a doozy in the security world. We kicked off the year by discovering operation Aurora, saw the first national-industrial sabotage attack with Stuxnet and are closing the year with Wikileaks about to become a constitutional crisis between the First amendment and a 1917 espionage law. Reality has well and truly become weirder than fiction. Read More

Microsoft's holiday bonus: Fixes for 40 flaws
Microsoft today patched 40 vulnerabilities in Windows, Internet Explorer (IE), Office, SharePoint and Exchange, including nine pegged "critical." Read More

WHITE PAPER: E-mail: Today's Problems and How to Deal With Them (Symantec)
As e-mail use balloons, IT faces looming archiving, management and security challenges. In these articles, Network World and its sister publications CIO, Computerworld and CSO explore how business users and IT alike can stay on top of the e-mail morass. Read now!

Huge EFF Win: Fourth Amendment Protects Email Privacy
The U.S. Appeals Court ruled that stored email is protected by the Fourth Amendment. This federal decision will hopefully urge Congress to update the law so when the feds secretly demand a user's email, but do not have probable cause, an email provider can safely say, "Oh yeah? Come back with a warrant."In a tremendous landmark decision, the U.S. Appeals Court ruled that stored email is protected by the Fourth Amendment. Read More


FILL OUT A SURVEY, GET REWARDED
Get a free Starbucks gift card for participating in a Network World survey about application performance management best practices. Research firm NetForecast is surveying enterprises about APM practices for an upcoming Network World article. The first 100 participants will receive a $5 Starbucks gift card. Click here.

DECEMBER GOODIES FROM THE SUBNETS
SharePoint 2010 power user training for three people from Webucator, plus a brand new iPad available from Microsoft Subnet. Five massive libraries on CCNP, security, NX-OS up for grabs on Cisco Subnet. Enter to win!

SLIDESHOWS

Best and worst celebrity technology moments of 2010
Here's a look back at the year's most memorable – for better or worse – celebrity moments in technology.

Top 15 Holiday Deals on Notebooks, Netbooks, and Desktops
Black Friday is gone, Cyber Monday is history, and Cyber Week is over, but the deals are still around--if you know where to look. The holiday shopping season is in full swing, and retailers are offering great computer discounts to fit everyone's budget. Take a look inside to find netbooks for $300, desktops with widescreen monitors for under $600, and 15-inch laptops starting at $400. Check it out.

MOST-READ STORIES

  1. Former contractor says FBI put back door in OpenBSD
  2. Netflix touts open source, ignores Linux
  3. Hacker tool Metasploit now targeting Cisco network gear
  4. 2010's most popular iPad apps
  5. Easy Linux for your grandparents
  6. VMware users pack a dozen VMs on each server
  7. The 10 bloodiest battles Microsoft and Google fought in 2010
  8. Will feds mandate Internet routing security?
  9. 3G vs. 4G: Real-world speed tests
  10. Bank of America claims ex-employees took databases

Get more IT peer perspective online:
LinkedIn Group | Facebook | Twitter



You are currently subscribed to networkworld_security_alert as security.world@gmail.com.
Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment