Friday, July 22, 2011

Security experts knock Google on PC infection warnings

10 things you shouldn't be able to buy online | Eyeball-scanning iPhone used by cops to ID suspects

Network World Security

Forward this to a Friend >>>


Security experts knock Google on PC infection warnings
Security experts are leery of Google's decision to warn millions of users whose PCs it believes are infected with fake security software and other malware. Read More


WHITE PAPER: Dell

Foundations of Security Information Management
This guide examines the details of each of these processes and provides best practices to build a foundation for SIM. Learn more.

WHITE PAPER: Riverbed

Visualization of an Intricate Network
The Depository Trust & Clearing House required enhanced network visibility to support their custody and asset servicing valued at $40 trillion. See how Riverbed provided: • End-to-end visibility of encrypted traffic • Lower MTTR • Application and network activity analysis without requiring probes on every WAN link Learn more!

10 things you shouldn't be able to buy online
The things you can purchase online these days are nothing short of mind-boggling. Read More

Eyeball-scanning iPhone used by cops to ID suspects
A blocky attachment to an Apple iPhone lets police officers snap a close-up of a suspect's eye and compare it to a database of scans. The system can ID a suspect in seconds. But should we have privacy concerns? Read More

Microsoft Forefront Identity Manager 2010
Identity management is the bane of many an IT administrator's existence. Employees come and go. Workers from partner companies require access to the network in a time-limited but secure way. Users forget their passwords and lose their smartcards. And new services come online all the time. It's a wonder anyone can get anything done. Read More


WHITE PAPER: CA Technologies

Ensuring Reliable Service Delivery
Learn how integrating infrastructure management tools with existing application performance management solutions will allow IT to promote holistic management that spans silos. Read Now

Anonymous releases restricted NATO document
The hacking collective Anonymous released a document on Thursday marked "restricted" from the North Atlantic Treaty Organization (NATO). Read More

T-Mobile securing Android phones with Good
T-Mobile is hoping to make it easier for businesses to use Android phones by reselling secure e-mail services from Good Technology. Read More

German security authorities hacked
Just a few weeks after German authorities opened a national Cyber Defense Center in Bonn it was attacked by hackers and now officials are struggling to arrest all of those involved. Read More


WHITE PAPER: IBM

Driving Information-led business innovation
This white paper identifies a shift in corporate thinking about the value of trusted information to the organization and outlines reasons why this shift is occurring. Read Now

Top general says Defense Department IT in 'Stone Age'
U.S. Marine Corps Gen. James "Hoss" Cartwright, vice chairman of the Joint Chiefs of Staff, was sharply critical of the Defense Department's IT systems and sees much room for improvement. Read More

House panel approves data breach notification bill
A House subcommittee approves a data breach notification bill. Read More

Big tech names Dell, Torvalds among Google+ early adopters
Part of the buzz this week about Google+ is that Google is reportedly working to lure celebrities such as Lady Gaga to its new social network service with verified accounts. Not sure if tech big shots beyond Facebook CEO Mark Zuckerberg count as celebrities, but the list of the technology industry's biggest names using Google+ is on the rise. Read More

Beyond Angry Birds: The 20 Most Acclaimed iPhone/iPad Games
Want games on your iPhone or iPad but unsure of where to start? Here's a handy guide Read More



GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Enter here.

SLIDESHOWS

20 of the weirdest, wackiest and stupidest sci/tech stories of 2011 (so far!)
From IT geeks winning millions to Google mush-brain syndrome, 2011 is shaping up to be one wacky year.

MOST-READ STORIES

  1. Lion letdowns: The new Mac OS X's biggest disappointments
  2. The full impact of Cisco's job cuts
  3. 10 technologies that will change the world in the next 10 years
  4. Big tech names: Dell, Torvalds among Google+ early adopters
  5. 15 incredibly useful (and free) Microsoft tools for IT pros
  6. Google Labs to be shut down
  7. Microsoft struggles to get Hyper-V drivers in Linux kernel
  8. Beyond Angry Birds: The 20 most acclaimed iPhone/iPad games
  9. Dell takes deeper dive into networking, buys Force10
  10. How to upgrade your Mac to OS X Lion

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment