Friday, July 15, 2011

Who are all these hacker groups?

iPhone and iPad Security: 4 Tips to Stay Safe | Inside Apple iOS 5

Network World Compliance

Forward this to a Friend >>>


Who are all these hacker groups?
Hacker groups that attack or steal—some estimates say there are as many as 6,000 of such groups online with about 50,000 "bad actors" around the world drifting in and out of them—are a threat, but the goals, methods, effectiveness of these groups varies widely. Read More


WHITE PAPER: EMC

Network Configuration & Change Management for Dummies
Read this and learn the NCCM "basics," key challenges associated with NCCM, the IT and business benefits of automating NCCM, and the top 10 reasons why automated NCCM creates value, reduces business risk, and can help ensure business goals are met. Read now

WHITE PAPER: Dell

IT Managers Face Security Challenges with Mobile Devices
A recent IDG survey reveals data security is the top barrier to supporting employees' mobile devices. Read more

iPhone and iPad Security: 4 Tips to Stay Safe
While waiting for Apple to fix the Jailbreakme.com 3.0 vulnerability, follow these four practices to avoid being bitten by malware. Read More

Inside Apple iOS 5
A whirlwind tour of Apple's newest mobile software for the iPhone, iPad and touch Read More

The Phone Hacking Scandal: The Answer is in Infrastructure
You can't turn on the TV these days without hearing more about how Rupert Murdoch's News of the World newspaper (I user the term newspaper loosely here, just as I would for the National Enquirer) was shut down after certain staffers illegally (well such should be the case; I'm not really sure about the law here) accessed and even modified an individual's (actually that of a number of individuals) cellular... Read More


WHITE PAPER: Riverbed

Case Study - Large Global Bank
A large global bank, one of the top 10 companies in the world, was facing several serious IT challenges as it continued to expand its operations globally. Download the case study to learn how Riverbed Steelhead® appliances helped the bank eliminate all branch-based backup, dramatically improve application speeds around the world, and more. Read now!

Face Detection Technology Tool Now Detects Your Moods Too
When Facebook automatically enabled facial recognition for photo tagging purposes last month, the company was forced to apologize after the backlash from angry users who had their privacy invaded by default yet again. Was that anger caused by Facebook changing the privacy settings, or because the photo tagging used facial recognition software, or a bit of both? Face.com, a face detection and recognition... Read More

Is your company ready for legal holds and compliance with mobility and the cloud?
It has not been too long since Google lost millions of e-mails and struggled to get most (!) of them back for customers. Amazon recently had cloud issues where they were not able to restore all the data their cloud customers had placed on their servers. Read More

Anonymous hacks Monsanto, targets Exxon Mobil, ConocoPhillips
Anonymous has posted names, addresses, phone numbers and email addresses of Monsanto employees, and is promising action against Exxon Mobil, ConocoPhillips, Canadian Oil Sands Ltd., Imperial Oil, the Royal Bank of Scotland and others. Read More


WHITE PAPER: Riverbed

Case Study: Boston College
Read this case study to learn how Boston College has reduced complexity of the backup process for over 1,700 seats by centralizing management. Read now

DeWalt resigns as president of Intel's McAfee subsidiary
Intel appointed new leaders to run the McAfee subsidiary as David DeWalt resigned as the unit's president, the company said on Wednesday. Read More

Anonymous hacks Booz Allen Hamilton, steals 90,000 military emails
The hacker group Anonymous claims it has stolen information from government contractor Booz Allen Hamilton that it says will help it hack into resources of other contractors and security consultants. Read More

Mac security firm ships first-ever iPhone malware scanner
French security firm Intego, which is known for its Mac OS X antivirus software, today released the first malware-scanning app for the iPhone and iPad. Read More

Does your security policy reflect mobility and cloud security?
Recently I was at a technical meeting and overheard a client say that even though this area had just recently suffered a great deal of damage from several tornados, businesses are still very reluctant to develop or test Disaster Recovery Plans (DRP) or Business Continuity Models (BCM). Read More

Microsoft yanks security site search after scammers poison results with porn
Microsoft on Saturday disabled the search tool on its Safety & Security Center after attackers poisoned results with links to pornographic URLs. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Enter here.

SLIDESHOWS

10 HP TouchPad apps for newbies
HP took the wraps off its shiny new webOS-based tablet - the TouchPad - on July 1. And like the Apple iPad, the Motorola Xoom and the BlackBerry PlayBook, this tablet debuts with a pack of applications customized for the tablet form factor.

MOST-READ STORIES

  1. Cisco injects new life into Catalyst 6500 switch
  2. Anonymous hacks Monsanto, targets Exxon Mobil, ConocoPhillips
  3. Fears rise in IT circles over new economic downturn
  4. "Depraved" Wi-Fi hacker gets 18 years in prison
  5. Cisco will be leaner, faster, more attentive, Chambers pledges
  6. HP fires back at Cisco's Sup 2T
  7. US to let drivers test advanced wireless auto safety technology
  8. It's Mango vs. Apple in a battle of the fruitphones
  9. Can RIM turn things around with 7 new BlackBerry smartphones?
  10. Inside Apple iOS 5

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment