Search This Blog

Wednesday, August 24, 2011

Lawsuit accuses comScore of extensive privacy violations

Researchers find first Android malware targeting Gingerbread | Twitter turns on SSL encryption for some users

Network World Security

Forward this to a Friend >>>


Lawsuit accuses comScore of extensive privacy violations
A proposed class-action lawsuit filed in federal court in Chicago accused online tracking and analytics firm comScore of surreptitiously collecting Social Security numbers, credit card numbers, passwords and other data from consumer systems. Read More


WHITE PAPER: CenturyLink Business

Manage Complexity, Cost and Compliance
To outsource or not to outsource IT security—that is the question for enterprises as they face increasingly complex cyber threats. Managed security services can help organizations alleviate the cost and complexity of proactively securing the IT infrastructure. Read Now.

WEBCAST: Cymphonix

Gain Complete Control Over Internet Bound Traffic
The Cymphonix Network Composer is the only network appliance that provides comprehensive clarity into all internet bound network traffic and simply powerful tools to manage that traffic with a holistic approach. Learn More Today!

Researchers find first Android malware targeting Gingerbread
Researchers have spotted the first malware that exploits a critical vulnerability in Android 2.3, aka Gingerbread, finding samples tucked into legitimate apps on Chinese download sites. Read More

Twitter turns on SSL encryption for some users
Twitter is adding SSL to the options that members have when they deal with the site and is even turning the secure mode on by default for some but not all members. Read More


WHITE PAPER: GFI Software

Protecting Against the New Wave of Malware
Learn why traditional antivirus approaches don't work and why a new approach to endpoint security is required to better protect your company from malicious threats. Learn about the scope of the malware problem and strategies that can help you defend against evolving malware threats. Read now!

Will desktop virtualization prosper pver the WAN?
If virtualization can ease endpoint management and improve security, why stop at remote office Windows PCs? More and more endpoints will simply render graphics over the network rather than receive software updates and store sensitive data on local memory and disk. Read More

iPhone thief accidentally IDs himself via Photobucket
Photobucket has a cool mobile application that allows users to automatically upload mobile pictures to the company's photo-sharing website. That's something that Korey Heess is unlikely to forget anytime soon, after allegedly snapping a picture of himself that was used by police to identify him as a smartphone thief. Read More


WHITE PAPER: F5

Controlling Migration to IPv6: A Gateway to Tomorrow
This White Paper describes how the BIG-IP LTM system help organizations migrate to IPv6, and can operate as an IPv4 to IPv6 gateway; operating identically in either environment, and within mixed environments. Learn More!

China hacking video shows glimpse of Falun Gong attack tool
China Central Television ran a documentary that included video of an attack tool being used against a U.S.-based Web site in support of the spiritual group Falun Gong. Read More

A social network for IT pros only
Wisegate, a social networking site for IT professionals only, launces next month to provide a forum for the exchange of advice and information about products and services. No vendors allowed. Read More



GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

SLIDESHOWS

The world's geekiest license plates
This slideshow goes out to all those drivers who aren't afraid to say it loud: I'm a geek and I'm proud. It's filled with images of vanity plates so geeky that they prompted someone else to take a picture and post it on Flickr. Enjoy.

MOST-READ STORIES

  1. The world's geekiest license plates
  2. 21 Chrome Web Apps for Serious Work
  3. Cisco aims for a go-anywhere router
  4. The real 'investment protection' story of the Cisco 6500
  5. Ridiculous FBI list: You might be a domestic terrorist if...
  6. What is a next-generation firewall?
  7. Cisco Announces the Cisco Certified Technician
  8. Palo Alto earns short list status
  9. Top 10 made-in-China iPhone apps
  10. Torvalds says, "Virtualization is evil"

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: