Friday, January 21, 2011

Is retaliation the answer to cyber attacks?

Playboy on iPad renews debate over privacy, workplace rules | Big Network Security Investments -- And Market Opportunities -- Ahead

Network World Security

Forward this to a Friend >>>


Is retaliation the answer to cyber attacks?
Should revenge assaults be just another security tool large IT shops use to counter cyber attacks? Read More


WEBCAST: F5 Networks

Secure DNS with BIG-IP v10.1 DNSSEC
Domain Name System (DNS) provides one of the most basic but critical functions on the Internet. If DNS isn't working, then your business likely isn't either. Secure your business and web presence with Domain Name System Security Extensions (DNSSEC) on F5 BIG-IP v10.1 Learn more now!

WHITE PAPER: F5 Networks

The Antidote to DNS Cache Poisoning and Other DNS Attacks
Domain Name System (DNS) provides one of the most basic but critical functions on the Internet. If DNS isn't working, then your business likely isn't either. Secure your business and web presence with Domain Name System Security Extensions (DNSSEC). Learn more!

Playboy on iPad renews debate over privacy, workplace rules
The arrival in March of Playboy on the iPad -- in a browser window -- could present a problem for IT managers who don't want objectionable material on personal hardware used in the workplace. Read More

Big Network Security Investments -- And Market Opportunities -- Ahead
Both networking and security professionals believe that network security is a high priorityHere is some interesting data that came out of the 2011 IT Spending Intentions report from ESG Research. In a global survey of 611 IT professionals from mid-market (i.e. 100-1000 employees) and enterprise (i.e. more than 1,000 employees) organizations, 46% of all firms will increase investment in networking products and services in 2011 while 58% will increase investment in security products and services... Read More

Trapster hack may have exposed millions of iPhone, Android passwords
Millions of e-mail addresses and passwords may have been stolen from Trapster, an online service that warns iPhone, Android and BlackBerry owners of police speed traps, the company said. Read More


WHITE PAPER: Quantum Corporation

Why Organizations Need LTO-5 Today
For years, tape storage systems have played a key role in efforts to store data for backup and retrieval, archiving, and contingency planning purposes. More recently, tape has been called on to help preserve and safeguard data to meet data retention laws and regulations. Read More

Three personal VPNs offer safer Wi-Fi
It's a truth universally acknowledged that public Wi-Fi hotspots aren't secure, but they're so convenient that most of us use them anyway. That's why there was something of a panic last year when Eric Butler showed everyone how easy it is to hijack Facebook, Twitter and PayPal accounts on open Wi-Fi networks via his FireSheep Firefox add-on. Read More

Cisco: Fraudster's money mules in short supply
A new security report from Cisco Systems estimates that the amount of stolen online bank account data far exceeds the number of people fraudsters can get to transfer stolen funds, who are known as "money mules." Read More

Social networking security threats taken too lightly
There's a gap between reports of malware generated from social networking sites and the potential threat businesses perceive, according to results of Sophos' s "Security Threat Report 2011". Read More


DOWNLOAD: Diskeeper

Get More System Speed and Reliability
Without Diskeeper, every server suffers from fragmentation. Only Diskeeper cures and prevents fragmentation and maximizes the performance and stability each server was designed to deliver. Costs far less than trying to run a site without it. Read More

Quirky moments at Black Hat DC 2011
A Black Hat Conference is nothing if not quirky as security geeks try every stunt possible to show what a clueless world we live in when it comes to security. Anyway, here are some such moments from this week's event. Read More

WikiLeaks obtains much secret data from P2P nets, not leaks, firm claims
WikiLeaks officials deny claims by a security firm that it has obtained some sensitive documents on P2P networks rather than from anonymous whistleblowers. Read More

Cisco beefs up Wi-Fi mobile payment security
Cisco is beefing up wireless transaction security with new software features for its Wi-Fi access points. The vendor says the changes add needed protection over and above that mandated by the Payment Card Industry (PCI) standard. Read More



BECOME AN INSIDER
Get premium content, in-depth reviews, practical tips and exclusive research. All for just signing up. Sign up for free today.

SLIDESHOWS

12 geekiest snow and ice sculptures
Not all tech weenies hunker down indoors when the snow starts piling up and the ice coats the streets. Some put on their mittens and boots and go to work creating fantastic snow and ice sculptures celebrating their tech favorites.

2011's 25 Geekiest 25th Anniversaries
Our fifth annual collection of the year's "geekiest anniversaries" kicks off with The Mentor's "Hacker's Manifesto" and includes such memorable characters as Captain Midnight and Ferris Bueller, institutions the likes of the IETF and Spy magazine, and inventions like the Super Soaker and disposable camera.

MOST-READ STORIES

  1. Yahoo IPv6 upgrade could shut out 1 million Internet users
  2. Cause of Windows Phone 7 data spikes found
  3. Fake GSM base station trick targets iPhones
  4. Apple reveals most downloaded iPhone, iPad apps of all time
  5. NASA background security checks do not go too far
  6. NSA breaks ground on Utah 'spy center' data center
  7. Cisco IOS vulnerabilities uncovered
  8. Cisco's 800-pound gorilla: Xsigo
  9. Panic time quiz: How prepared are you for IPv6?
  10. Gamers hijacked your server? Might be an inside job

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment