Wednesday, February 23, 2011

Why CardSpace was abandoned

Zeus trojan is back and targeting Windows Mobile phones | Planet Venus set to get in the Moon's face

Network World Security: Identity Management

Forward this to a Friend >>>


Why CardSpace was abandoned
Last issue I told you about Microsoft's decision to drop the CardSpace system. Today I'd like to quote from two people who have been tightly tied to CardSpace -- one inside Microsoft and one outside. Read More


RESOURCE COMPLIMENTS OF: Hitachi Data Systems

Hitachi IT Operations Analyzer
Pinpoint root cause of network issues up to 90% faster. Automated Root Cause Analysis speeds remediation. FREE video and 30-day trial. Download free 30-day trial

WHITE PAPER: Extreme Networks

Extreme Networks debuts 40 GbE for under $1,000
The VIM3-40G4X adds four 40 GbE connections to Summit® X650 top-of-rack stackable switches for $3,995, or less than $1,000 per port. The new module is fully compatible with existing Summit X650 and Summit X480 switches, increasing scalability of both virtualized and non-virtualized data centers. Learn more!

Zeus trojan is back and targeting Windows Mobile phones
2011 likely to be a big year for smartphone security as black hats, and white hats, turn their attention to it.A new variant of the Zeus trojan has surfaced and it's targeting Windows Mobile phones. In September a variant was discovered that targeted Symbian and BlackBerry phones. Read More

Planet Venus set to get in the Moon's face
Space show between Moon and Venus; NASA satellite set to launchWith all the talk lately about the recent monster solar flare and its impact on Earth, there are other things going on up there to make you gaze into space. Read More


WEBCAST: Adobe

Deliver Engaging Communications with PDF Portfolios
Learn how easy it is to create and send a single PDF Portfolio using Adobe Acrobat X Pro. See how to create a rich, branded PDF Portfolio containing many types of documents, each with a rich preview experience. Learn More

Smartphone Security Threats Overdramatized, Experts Say
I was sitting in the middle of one of the most security conscious crowds you'd ever come across--about 200 computer security professionals listening to a high-powered panel on mobile security threats at the RSA Conference in San Francisco last week. Read More

Memory scraping malware goes after encrypted private information
What's "pervasive memory scraping" and why is it considered by SANS Institute security researchers to be among the most dangerous attack techniques likely to be used in coming the coming year? Read More


WHITE PAPER: St. Bernard Software

Compare Web Filters, Enter to win an iPad
View this demo of iPrism Web Filter and learn why throughput speeds of up to 100+ Mbps, anti-virus protection, and seamless Active Directory/Terminal Services integration and reporting included at no charge has made iPrism the appliance-based choice for organizations of all sizes. Learn More

How to secure Web applications from insecure mobile devices
RSA says 2011 will be the year of mobile device malware and of criminals exploiting these devices to commit fraud and other crimes. With literally billions of devices in use worldwide, it's hard to secure them all. Trusteer takes a different approach: secure the applications people want to access from these mobile devices. The solution involves a secure Web browser on a gateway that the mobile device must use to access the protected application. Read More

Road warriors: Secure your laptops
When staff members travel using such powerful computers, they are subjecting their personal office to possible loss, penetration, and damage – and possible legal consequences. In today's article, I'm presenting simple defences that I hope will be useful for employee security-awareness training. Read More

FBI: Web-based services hurting wiretapping efforts
Web-based services are frustrating law enforcement agency's ability to have real-time wiretaps, an FBI lawyer says. Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a Windows 7 Enterprise Technician class for three people. From Cisco Subnet: 15 copies of AAA Identity Management Security. Enter here.

SLIDESHOWS

When IT professionals cheat
We asked 200 IT professionals to tell us how often IT workers cheat on certification exams, buy fake gear or illegally share software. Here are the results.

Tech 'firsts' that made a President's day
From the first presidential steamboat ride to the introduction of electricity in the White House to Obama's famous BlackBerry, our nation's commanders in chief have always enjoyed the privilege of being exposed to technology's cutting edge -- even if they haven't always embraced the opportunities.

MOST-READ STORIES

  1. Anonymous: It's a trap!
  2. Mobile heavyweights seek to finalize 1Gbps mobile standard
  3. The iPad data dilemma: Where cloud storage can help
  4. iPad could get Intel's superfast Light Peak connector
  5. Disk or tape? How about both
  6. How IT pros cheat on certification exams
  7. Cerf: Future of Internet doesn't include an IPv7
  8. Cisco grapples with transition as routers and switches lag
  9. Cisco's moment of truth
  10. Why you freak out over Facebook

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment