Tuesday, November 22, 2011

The Dirty Dozen of security-vulnerable smartphones

Gunman barricades himself inside Air Force's GPS satellite control facility | Google, Facebook part of FTC facial recognition technology assessment

Network World Security

Forward this to a Friend >>>


The Dirty Dozen of security-vulnerable smartphones
Which smartphones pose the biggest security and privacy risks to consumers and corporations? Read More


WEBCAST: ForeScout Technologies

CISO in the Know - Mitigating Modern Attacks
This webcast examines sophisticated and targeted threats, security gaps, techniques and new technologies with regards to understanding and defending against zero-day threats, propagating worms, low-and-slow attacks and advanced persistent threats (APT). Learn more.

WHITE PAPER: BMC

Managing Cloud Services from Request to Retirement
This lifecycle is tailored to the needs of the business, with both the flexibility to deliver the full required software stacks and the management rigor to ensure the operational integrity of the cloud. Learn More!

Gunman barricades himself inside Air Force's GPS satellite control facility
The Air Force confirmed this afternoon that an individual from the 50th Security Forces Squadron has barricaded himself inside the Colorado base building that controls most of the GPS communications throughout the U.S. Read More

Google, Facebook part of FTC facial recognition technology assessment
The Federal Trade Commission has set the lineup for its workshop next month that will examine the privacy and security impact of facial recognition technology. Read More

Celebrating the birthplace of the Internet in pictures
Nov. 21 is the 42nd anniversary of the first permanent ARPANET link; the Internet's beginning Read More

MalCon: Malware Hacking Conference for Twisted Pen Testers
While most Americans will be lulled into a Turkey coma, or perhaps fighting Black Friday crowds, a MalCon conference in Mumbai will be kicking off with a wicked 'muhahaha' from malware and information security researchers as they dive into twisted pen testing. It's a bit like the anti-antivirus crowd. While MalCon said it does not promote malware creation, it also laughs and answers "no" to the question... Read More


WHITE PAPER: Dell

Mobility KnowledgeVault
The resources in this Mobility KnowledgeVault provide expert guidance, peer advice, survey results and best practices to help you protect your mobile infrastructure. From determining a policy for employee-owned devices and data encryption to supporting the six major mobile operating systems, securing mobile devices and data is a top priority. View now

Cool Yule Favorites: 20 techie gifts we like
Read More

Debate erupts over Android malware dangers
Reports of an explosion in Android malware have sparked a debate over whether malware on mobile devices is actually a big deal for most users. Read More

Shopping at work? More CIOs say it's not allowed
As scores of Black Friday and Cyber Monday shopping deals start piling up, do you know what your end users are up to? Are you being asked to curb your fellow workers' online shopping activities? If so, you're not alone. More companies are taking steps to restrict holiday shopping at work, according to CIOs surveyed by Robert Half Technology. Read More

OpenPGP JavaScript implementation allows webmail encryption
Researchers from German security firm Recurity Labs have released a JavaScript implementation of the OpenPGP specification that allows users to encrypt and decrypt webmail messages. Read More


WHITE PAPER: Sybase

Scaling Out Query Performance with Sybase IQ 15.3
This paper is meant to provide a holistic perspective and introduce the technical concepts behind DQP in general and Sybase® IQ 15.3's DQP implementation through the PlexQ Distributed Query Platform. Read now.

Despite controversy, cybercrime treaty endures
Delegates from around the world are meeting in France this week to discuss the only international treaty dealing with cybercrime, a treaty that has come under fire from some countries but defended by others as a crucial tool in fighting electronic crime. Read More

Healthcare breaches: Do they even matter?
Electronic medical record breaches continue, yet the public pays little attention to healthcare provider security and privacy policies. Read More

Four rising threats from cybercriminals
Criminal hackers never sleep, it seems. Just when you think you've battened down the hatches and fully safeguarded yourself or your business from electronic security risks, along comes a new exploit to keep you up at night. It might be an SMS text message with a malevolent payload or an errant signal designed to jam GPS receivers. Read More

FBI's holiday online shopping tips
In advance of the holiday season, the FBI reminds shoppers to beware of cyber criminals and their aggressive and creative ways to steal money and personal information. Scammers use many techniques to fool potential victims including fraudulent auction sales, reshipping merchandise purchased with a stolen credit card, sale of fraudulent or stolen gift cards through auction sites at discounted prices, and phishing e-mails advertising brand name merchandise for bargain prices or e-mails promoting the sale of merchandise that ends up being a counterfeit product. Read More



SLIDESHOWS

Geekiest holiday cards
Holiday decorations appeared before the last of the Halloween skeletons were even boxed up. An endless loop of seasonal music is already playing in stores. Retail commerce forecasts are piling up. The countdown is on, and it's not too early to start thinking about holiday cards. Here are some clever geeky options for inspiration.

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. Monkey, dragon, football and the rest of 2011's worst passwords
  2. iPhone 5 rumor rollup for the week ending Nov. 18
  3. Top IT turkeys of 2011
  4. Apparent cyberattack destroys pump at Illinois water utility
  5. Occupational hazard: 7 hot jobs for 2012
  6. Cisco WAAS shows pizzazz
  7. Cisco pulls away from pack in Q3
  8. Raytheon gets $10.5 million to develop "serious games"
  9. Windows 8 coming in 2012? 6 reasons why this could derail Windows 7 now
  10. Lamest and most bizarre iPhone 5 rumors of 2011

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment