Search This Blog

Tuesday, July 19, 2011

Anonymous takes aim at Google+ in more ways than one

Hacktivism moves from pranks to problems | 7 high-tech programs that want to pick your brain

Network World Security

Forward this to a Friend >>>


Anonymous takes aim at Google+ in more ways than one
Google+ may be getting some attention it doesn't want -- from Anonymous, which says it will target the new social networking site that launched last month. Read More


WHITE PAPER: GFI Software

Messaging and Web Security Best Practices for 2011
In this white paper, Osterman Research discusses how the daily occurrence of malware within organizations has become decidedly worse over the past several years. Read More

WEBCAST: CA Technologies

Is Your DR Plan Truly Reliable?
No matter how you define a disaster, you need a strategy that provides protection, fast recovery and high availability of your systems, applications and data. Attend this webcast to learn about disaster recovery best practices and the wide range of technologies available to protect your organization. Learn More

Hacktivism moves from pranks to problems
Far from being "sophisticated" attacks, LulzSec and Anonymous are run of the mill, say experts. But companies need to look to their defenses. Read More

7 high-tech programs that want to pick your brain
With increasing frequency it seems agencies of the government are looking to tap into the public conscienceness to gather information on everything from how you surf the Web to how they can use information generated by you to predict the future. It's all a little creepy, really. Here we take a look at seven programs announced this year that in some cases really want to crawl into your brain to see what's happening in the world. Read More


WHITE PAPER: GFI Software

PCI-DSS Compliance and GFI Software Products
The intent of this document is to provide you with GFI's understanding of the requirements, and how the GFI Software product line can assist you to meet PCI compliance as outlined in the PCI DSS Requirements. Read now!

Botnet Called 'Practically Indestructible'
A new and improved botnet that has infected 4.5 million Windows PCs is "practically indestructible," security researchers say. Read More

10 Google+ Tips for Beginners
You just got your hands on a Google+ invite -- but what next? Check out these 10 tips to get you started on Google's new social network. Read More


WHITE PAPER: Riverbed

Streamlined Data Protection
One of the greatest challenges today is effectively backing up and protecting the vast amounts of data stored throughout an organization. With WAN optimization, you can accelerate network-based backup by 5x and can reduce bandwidth use by up to 95%. Download this paper and learn more about this strategy today. Learn More

Apple iOS 4.3.4 security fix jailbroken overnight
Apple's iOS 4.3.4 PDF vulnerability fix issued Friday didn't stymie jailbreakers for long -- a beta jailbreak tool for the mobile software update was released on Saturday. Read More

Security Manager's Journal: The perils of enterprise search
I'm a big fan of search. The ability to use the Internet to cull information on virtually any topic with just a few clicks has made me more efficient and better informed. And "information" can come in the form of pictures, documents, videos, news feeds -- whatever you need. Read More

DeWalt resigns as president of Intel's McAfee subsidiary
Intel appointed new leaders to run the McAfee subsidiary as David DeWalt resigned as the unit's president, the company said on Wednesday. Read More

10 hard truths IT must learn to accept
Unsanctioned devices, compromised networks, downtime -- today's IT is all about embracing imperfections Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Enter here.

SLIDESHOWS

10 HP TouchPad apps for newbies
HP took the wraps off its shiny new webOS-based tablet - the TouchPad - on July 1. And like the Apple iPad, the Motorola Xoom and the BlackBerry PlayBook, this tablet debuts with a pack of applications customized for the tablet form factor.

MOST-READ STORIES

  1. 10 technologies that will change the world in the next 10 years
  2. Getting at the real truth about IPv6
  3. The horror of blue LEDs!
  4. The best of 'Damn you, autocorrect'
  5. 10 hard truths IT must learn to accept
  6. Can Sprint realistically support both LTE and WiMAX?
  7. Cisco injects new life into Catalyst 6500 switch
  8. The next WiFi: Is your 802.11n installation already obsolete?
  9. 7 high-tech programs that want to pick your brain
  10. New Cisco switch delivers 60 watts to the desktop

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: