'War texting' lets hackers unlock car doors via SMS | HBGary Federal legal threats, not Anonymous chase Aaron Barr out of Defcon security conference | ||||||||||
Network World Security Strategies | ||||||||||
Sexting: Loss of control = Embarrassment, bullying & potential prosecution WHITE PAPER: IBM Next generation data integration from TDWI Research In November 2010, TDWI sent an invitation via e-mail to the data management professionals in its database, asking them to complete an Internet-based survey. The resulting completed responses of 323 respondents form the core data sample for this report. Read Now In this Issue
WHITE PAPER: CA Technologies Service Assurance Defined This Forrester paper explains the concept of service assurance and highlights how it can address fundamental issues around managing application performance and business services. Learn More 'War texting' lets hackers unlock car doors via SMS HBGary Federal legal threats, not Anonymous chase Aaron Barr out of Defcon security conference IT security's scariest acronym: BYOD, bring your own device WHITE PAPER: BMC Workload Automation Challenges and Opportunities This Executive Brief discusses IDC's perspective on how enterprise workload management requirements are changing and highlights the ways that workload automation solutions can address these emerging requirements. Learn More! Cloud Security: Will Your Business Data Be Safe In the Cloud? The IBM Selectric typewriter turns 50 I Was Wrong About Self-Encrypting Hard Drives WHITE PAPER: CA Technologies Exceptional Application Experience To improve and ensure the performance and availability of business-critical web applications, organizations need to be able to see and understand the actual user experience. This paper examines the five essentials of application performance monitoring. Learn More Debate rages over how to manage personal mobile devices used for work Passwords in Mac OS X can be pilfered with new tool Exploit demo on tap at Black Hat could 'make your water undrinkable' Sniffer hijacks secure traffic from unpatched iPhones | ||||||||||
GOODIES FROM THE SUBNETS SLIDESHOWS The Geekiest iPad Apps Ever MOST-READ STORIES
| ||||||||||
Do You Tweet? You are currently subscribed to networkworld_security_strategies_alert as security.world@gmail.com. Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy To contact Network World, please send an e-mail to customer_service@nww.com. Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701 ** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. ** |
Everything related to Computer Security - Security Audits, Security Vulnerabilities, Intrusion Detection, Incident Handling, Forensics and Investigation, Information Security Policies, and a whole lot more.
Search This Blog
Thursday, July 28, 2011
Sexting: Loss of control = Embarrassment, bullying & potential prosecution
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment