Search This Blog

Monday, June 20, 2011

U.S. military sharing secret cyber threat info with defense contractors

Microsoft rings alarm bell on fake Windows support calls | Connecticut concerned about Facebook face recognition

Network World Security

Forward this to a Friend >>>


U.S. military sharing secret cyber threat info with defense contractors
A new U.S. military program shares classified information about cyber threats with defense contractors and their ISPs as part of a stepped up effort to blunt potential cyber attacks, a Department of Defense official announced on Thursday. Read More


WHITE PAPER: CA Technologies

Defend Against Insider Threats
Organizations must accept the reality that insider threats are no longer an abstract concept. This paper explains the factors that are increasing the insider threat and details a proactive approach that leverages identity and access management to reduce risk and improve compliance. Learn More

WHITE PAPER: AirMagnet, Aruba Networks, Cisco, Enterasys Networks, HP, and Motorola

Get the Mobility-Free-For-All Under Control
Which is more secure: controlling wireless network access by the device, like an IP address or device type? Or is it by the user identity and that user's access rights and credentials? And how important is location? Learn more!

Microsoft rings alarm bell on fake Windows support calls
Microsoft today warned that scammers have taken to the phone lines to dupe Windows users into putting malware on their machines or paying for worthless help. Read More

Connecticut concerned about Facebook face recognition
Connecticut Attorney General George Jepsen has expressed concern that Facebook's "Tag Suggestions" face recognition feature compromises consumer privacy, and asked for a meeting with company officials. Read More

Smart grid (in)securities
As the power grid becomes more intelligent, it also becomes more dangerous. Read More


WHITE PAPER: Raritan

Data Center Transformations
Build outs, consolidations and acquisitions are large-scale projects that can be very disruptive and require careful planning and implementation to maintain operations. This white paper examines the process and what's required to meet IT goals and objectives and maintain business continuity. Read now!

Feds move toward health claims database despite privacy fears
Despite lingering privacy concerns, the U.S. Office of Personnel Management is plowing ahead with plans to build a massive centralized database containing detailed healthcare information on millions of federal workers and their families. Read More

Fraud starts after Lulzsec group releases e-mail, passwords
Debbie Crowell never ordered the iPhone, but thanks to a hacking group known as Lulzsec, she spent a good part of her Thursday morning trying to get US$712.00 in charges reversed after someone broke into her Amazon account and ordered it. Read More

Hospital turns to palm reading to ID patients
NYU's Langone Medical Center is the first hospital in the Northeast to use a new infrared palm-scanning technology that ensures patients are linked to their medical records and helps prevent medical ID theft. Read More


WHITE PAPER: Extreme Networks

Networks in Motion
Download this whitepaper today and discover how you can cost-effectively optimize your network for the mobile demands of today's business. Examine how IT can provide: * Personalization and intelligence. * Ease of operation. * Seamless quality of user experience. * Secure on-the-go access to public and private networks. Read now!

US warns of problems in Chinese SCADA software
Two vulnerabilities found in industrial control system software made in China but used worldwide could be remotely exploited by attackers, according to a warning issued on Thursday by the U.S. Industrial Control Systems Cyber Emergency Response Team (ICS-CERT). Read More

As fraud abounds, design students craft safer ATMs
Going to an ATM can be an unnerving, vulnerable experience: You're faced against a wall, taking out cash with little visibility as to whom is watching you. Read More

DARPA, NASA seek ideas for starship travel
The U.S. Department of Defense and NASA today issued a call for papers to help in their quest to ensure that humans can start interstellar space travel within 100 years. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Microsoft Subnet: A set of classes for a Microsoft Cert from Webucator and Polycom videoconferencing system. Enter here.

SLIDESHOWS

10 SaaS companies to watch
These days, companies are applying the software-as-a-service (SaaS) model to just about everything, from core business functions, including IT, to industry-specific processes. This list, compiled with the help of SaaS trend watchers and users, provides a representative look at what types of software you'll find offered in the cloud.

MOST-READ STORIES

  1. Want to stop cybercrime? Follow the money
  2. Chrome nearly replaced Firefox in Ubuntu Linux
  3. Cisco again looks to debunk the multivendor network
  4. iPhone 5 rumor rollup for the week ending June 17
  5. U.S. military sharing secret cyber threat info
  6. Cisco backs embattled RSA SecurID
  7. World IPv6 Day is complete. Did anyone notice?
  8. The data center needs an operating system?
  9. Microsoft rings alarm bell on fake Windows support calls
  10. 17 super-specific social networks

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: