Thursday, September 29, 2011

Will advanced biometrics automate future war machines?

The encryption quiz | Romance scams plague UK: 200,000 victims?

Network World Security

Forward this to a Friend >>>


Will advanced biometrics automate future war machines?
Biometric security breakthroughs are coming that would let the military capture from a distance an iris and facial scan of an individual and immediately match it to a biometrics-based "Watch List" of suspected terrorists, combatants or criminals. Read More


WHITE PAPER: CenturyLink Business

Manage Complexity, Cost and Compliance
To outsource or not to outsource IT security—that is the question for enterprises as they face increasingly complex cyber threats. Managed security services can help organizations alleviate the cost and complexity of proactively securing the IT infrastructure. Read Now.

WEBCAST: IBM

Using IBM Tivoli Security Management for z/OS
Administration can be a complex world where security is concerned. The resources spent on administration, management, auditing and compliance can be considerable. Watch the demo, "Using IBM Tivoli Security Management for z/OS," and see how IBM® can help you protect your business—simply, efficiently and more effectively. Learn More

The encryption quiz
Substitution ciphers, military encryption devices, hashing, symmetric key algorithms – how well do you know them? Read More

Romance scams plague UK: 200,000 victims?
Research out of the UK today says that perhaps as many as 200,00 people in that country have been victims of online romance scams and the same study says over 1 million people personally know someone who has been scammed by one of these heartless fraudsters. Read More

Digg Scrapes FaceBook for Diggers' Real Identities & Photos, Changes Profiles
For the last couple weeks, there have been numerous ongoing and proudly proclaimed changes on Digg like Digg Newsrooms. There were other changes to Digg accounts that were not loudly announced. While people on Facebook continue to be outraged over the long history of privacy invasions, which then require a user to opt-out instead of users automatically opted-in to privacy-by-design, Digg does not have... Read More


WHITE PAPER: CA Technologies

Sainsbury's Safeguards Supply Chain for over 800 Stores
Sainsbury operates the second largest online food retailer in the U.K. See their approach to gain better visibility to 1,800 devices and ensure high-availability of its network to safeguard the supply chain for over 800 stores and 100,000 online shoppers per week. Read now

Science and religion can and do mix, mostly
An interesting study by Rice University recently found that in one of the one of the more voracious social (and increasingly political) battlegrounds, science v. religion there is more common ground that most folks believe. In fact, according to the study, only 15% of scientists at major US research universities see religion and science as always in conflict. Read More

GM's OnStar feels heat, reverses controversial privacy changes
Only a few days after it made what U.S. Senator Charles Schumer (D-NY) called "brazen" changes to its privacy policy, General Motors subsidiary OnStar has backed down and said it would revert back to its previous terms of service. Read More

Telecom Bill Cramming Impacts IT's Bottom Line
Unauthorized charges on enterprise telecom bills are getting more sophisticated and harder to detect. Read More


WHITE PAPER: CA Technologies

Service Assurance Defined
This Forrester paper explains the concept of service assurance and highlights how it can address fundamental issues around managing application performance and business services. Learn More

Argonne researchers 'hack' Diebold e-voting system
Argonne National Lab researchers say they easily hacked an electronic voting machine model that's expected to be widely used to tally votes in the 2012 elections using inexpensive, widely-available electronic components. Read More

Mac OS X Lion: Losing its security pride
Spate of vulnerabilities and Trojan attacks has some wondering about the state of Apple Mac security. Read More

Wireless, security researchers among early-career scientists recognized by Obama
President Obama this week recognized 94 early-career scientists and researchers, including those advancing network security and wireless communications. Among recipients of the Presidential Early Career Award for Scientists and Engineers (PECASE) whose work is in the networking field: Read More

Zenprise offers iPad app for secure SharePoint access
Positioned as a data loss prevention tool, the app and server software focus on enforcing SharePoint content policies on iOS devices Read More



SLIDESHOWS

Geekiest cupcake designs
From mainstream iPhone and Google icons to geeky Ubuntu and Big Blue logos, cupcake bakers have taken inspiration from technology for their complex fondant-and-frosting structures. Here are some of our photogenic favorites.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center and Microsoft training of the winner's choice from Webucator.. Enter here.Also: Please take our survey on certifications and your career

MOST-READ STORIES

  1. Juniper takes on Cisco, HP in 'simple' networking
  2. YouTube founders breathe new life in Delicious
  3. Reimagining Microsoft without Ballmer
  4. Scammers pretend to be friendly office printers
  5. Is quantum computing real?
  6. Amazon's new tablet: What to expect
  7. Windows 8 coming in 2012? 6 reasons why this could derail Windows 7 now
  8. Q&A: Sprint's take on the future of mobile device management
  9. Microsoft offers ideas for users to beat the BEAST threat
  10. Telework controversy: Are 17% of teleworkers unabashed slackers?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment