Tuesday, July 12, 2011

Did Harvard Researchers Breach Students' Privacy?

Development benefits, and security risks, of HTML5 'hybrid' mobile apps | 7 free Windows tune-up tools and tips

Network World Security

Forward this to a Friend >>>


Did Harvard Researchers Breach Students' Privacy?
When Harvard researchers aggregated Facebook data and supposedly anonymized it, then no one should have been able to identify those users. That was not the case, however, and the "privacy meltdown" caught Harvard researchers in a net of ethical turmoil. The right or wrong of data mining social networks for social-science studies is a bone of contention between privacy watchdogs and researchers. Read... Read More


WHITE PAPER: IBM

Realize More Business Value
Read the white paper and learn how IBM Tivoli® Security Management for z/OS® can safeguard your business—and deliver rapid ROI. Read Now

WEBCAST: Riverbed

Faster Recovery for Windows Applications and Data
Are your backup & recovery plans up to snuff? Will you be able to restore critical systems & data quickly in the event of an outage? Learn valuable information on how to protect Windows applications & data in a distributed environment. Learn about challenges in protecting & restoring Exchange, SQL, & Windows file server, & more. Learn more!

Development benefits, and security risks, of HTML5 'hybrid' mobile apps
So-called hybrid mobile apps are a way to finesse the debate over whether native apps, written in a given language for a specific OS, or web apps, written in HTML5, CSS and Javascript, are best. A pair of well-written blogposts, neither of which are intended as a programmers' tutorial, highlight the emerging opportunities, and risks, of hybrid mobile apps. Read More

7 free Windows tune-up tools and tips
You don't need to spend money to keep a Windows computer running in top form. Here's how to fix, clean and maintain Windows using programs you can download now for free. Read More


WEBCAST: Riverbed

3 Ways WAN Optimization Pays Back
One of the most complicated and expensive endeavors that an IT organization ever undertakes is disaster recovery. If you have DR requirements that aren't being met, before you think about buying more bandwidth or looking at other complex solutions, you should really look at Riverbed WAN Optimization. Watch the video to learn more. Learn more!

Microsoft yanks security site search after scammers poison results with porn
Microsoft on Saturday disabled the search tool on its Safety & Security Center after attackers poisoned results with links to pornographic URLs. Read More

Does your security policy reflect mobility and cloud security?
Recently I was at a technical meeting and overheard a client say that even though this area had just recently suffered a great deal of damage from several tornados, businesses are still very reluctant to develop or test Disaster Recovery Plans (DRP) or Business Continuity Models (BCM). Read More


WHITE PAPER: CA Technologies

Performance Metrics and the Cloud
Unlike static configuration management databases, which often contain information too outdated for real-time understanding, a dynamic operational service model provides relevant, timely information. Read More

UK claims cybercrime victory after phishing gang sentencing
U.K. cybercrime investigators claimed victory with the sentencing of three men on Monday following the prosecution of an organized phishing gang. Read More

12 Tech Revolutions That Fizzled
Virtual reality and its oversize helmets. The Segway scooter. AT&T's Picturephone from 1964? These tech innovations and more were supposed to change your life. Whoops! Read More

6 vacation ideas from your spam folder
Spammers, take me away! Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Enter here.

SLIDESHOWS

Five potential Facebook killers
The social networking scene is constantly in flux. Facebook is at the top of the heap right now, but challengers are springing up all the time, hoping to leverage the next big wave into a lucrative IPO. Here are five social media sites that are creating a buzz.

MOST-READ STORIES

  1. 7 free Windows tune-up tools and tips
  2. Who are all these hacker groups?
  3. Is the operating system dead?
  4. iPhone 5 rumor roll-up for the week ending July 8
  5. Google+ Privacy: 5 settings you need to know
  6. Microsoft's aversion to iOS, Android gives QuickOffice a chance
  7. The best of 'Damn you, autocorrect'
  8. Ballmer, Branson headline Microsoft's partner conference
  9. A conversation with Jayshree Ullal CEO, Arista Networks
  10. Caution: WiFi design challenges ahead

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment