Search This Blog

Tuesday, July 05, 2011

Your first car and other challenges

Despite controversy, federal, state wiretaps on the rise | Cybercrime fight hurt by apathy, law enforcement hurdles

Network World Security: Identity Management

Forward this to a Friend >>>


Your first car and other challenges
The federal agency that regulates banks, the Federal Financial Institutions Examination Council (FFIEC), has finally released an update to its 2005 guidance on Internet banking authentication. This has been awaited since a draft of the document was leaked last winter. Read More





Despite controversy, federal, state wiretaps on the rise
While their over-use is controversial federal and state requests for court permission to intercept or wiretap electronic communications increased 34% in 2010 over 2009 with California, New York, and New Jersey accounting for 68% of all wire taps approved by state judges. Read More

Cybercrime fight hurt by apathy, law enforcement hurdles
General public apathy and collaboration with the law enforcement community assure that cybercrimes of all sorts will continue to rise. Read More

Survey: US agencies aren't tracking data center use
Many U.S. government agencies aren't tracking their data centers' capacity and energy use, a new survey says. Read More



Botmaster's extravagant spending attracted police
Conspicuous spending -- not technical sleuthing -- unearthed what may be the largest login-stealing botnet yet known, according to one expert working on the case. Read More

Outsourcing to India may not be affected by privacy rules
Personal data sent to India by companies outsourcing work to service providers in the country will not be covered under the country's stringent new rules for the collection of personal data, an executive of a data protection standards company set up by the National Association of Software and Service Companies (Nasscom) said. Read More

Apple plugs phishing hole on developer website
The hacker group that flagged a vulnerability on an Apple development website, a vulnerability that could have led to phishing attacks against Mac OS X, iPad and iPad developers, says Apple finally fixed the hole that was identified two months ago. Read More



Traditional host-based anti-virus software losing luster?
Traditional host-based anti-malware packages just aren't that useful anymore, according to some companies that find it either doesn't protect against the main dangers they face from the Web or it simply doesn't run well in virtualized computer environments. Read More

Microsoft clarifies MBR rootkit removal advice
Microsoft has clarified the advice it gave users whose Windows PCs are infected with a new, sophisticated rootkit that buries itself on the hard drive's boot sector. Read More

Malicious activity alert: Anonymous hack-school grads come online in 30 days
In about a month the first graduates of the new Anonymous hacking school could start having an impact on the frequency of cybercrime. Read More

Securing Data on All Devices
Scenario: Protecting sensitive data on mobile devices Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Microsoft Subnet: A set of classes for a Microsoft Cert from Webucator and Polycom videoconferencing system. Enter here.

SLIDESHOWS

12 of the slickest designs in enterprise tech gear available today
Consumer devices tend to get all the praise for their designs, but there's plenty of cool equipment to be found in the enterprise market. When hardware vendors tag-team with renowned industrial designers, the results can be impressive. Here are some of our favorites.

MOST-READ STORIES

  1. NYC mayor demands $600M refund on software project
  2. Anonymous hack-school grads come online in 30 days
  3. Despite controversy, federal, state wiretaps on the rise
  4. Apple, Microsoft consortium beats Google for Nortel patents
  5. Samsung Chromebook out-selling Android tablets on Amazon.com
  6. IBM takes dim view of EU claims
  7. Traditional host-based anti-virus software losing luster?
  8. 10 compelling apps for Cisco Cius
  9. Tablet deathmatch: HP TouchPad vs. Apple iPad2
  10. HP TouchPad goes on sale to mixed reviews

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: