Search This Blog

Friday, December 02, 2011

From Anonymous to Hackerazzi: The year in security mischief-making

2011's biggest security snafus | The water pump alarm

Network World Security

Forward this to a Friend >>>


From Anonymous to Hackerazzi: The year in security mischief-making
It wasn't a good security year from RSA break-in to hacks on Sony, Google and Facebook. Read More


WHITE PAPER: NetIQ

Security Information and Event Management eGuide
Security threats these days are increasingly focused on critical components of enterprise infrastructures – the servers, databases, and directories that store and manage crucial corporate information. Learn More!

WEBCAST: Oracle

High Availability for SMBs Just Got Easy
Tuesday, December 13, 9am PT / 12 noon ET Join this live Webcast to hear how Oracle has removed all the barriers to high availability with an appliance that provides a fully-configured, fully-patched system that can have you up and running in less than 2 hours. Learn More

2011's biggest security snafus
Perhaps it was an omen of what was to come when the city of San Francisco on New Year's Eve 2010 couldn't get a backup system running in its Emergency Operations Center because no one knew the password. Read More

The water pump alarm
If nothing else, the now disputed "hacking" of an Illinois water utility has brought the spotlight back to shine on the vulnerability of our national infrastructure. Read More


WHITE PAPER: i365

Trusted Data Assurance in the Cloud
Cloud-based services are here to stay. Cloud services are even more attractive for companies who are being hit with the high cost of meeting compliance requirements - especially for small and mid-size companies that have shrinking or no information security budget. Read now!

National Do Not Call Registry under attack from scammers, unrelenting telemarketers
It seems the nation's Do Not Call system is under attack. First The Federal Trade Commission today issued a warning about scammers looking to gather personal information by pretending to represent the National Do Not Call Registry. The callers offer to provide an opportunity to sign up for the Registry but the FTC nor the Registry makes no such calls. Read More

The IBM Security Systems Division
I spent the last few days at IBM's "Software Analyst Connect 2011" event. Before attending this event, I was pretty clear on why IBM bought Q1 Labs and why it formed a new security division. After attending this event, I have some further thoughts about this move: Read More


WEBCAST: ForeScout Technologies

CISO in the Know - Mitigating Modern Attacks
This webcast examines sophisticated and targeted threats, security gaps, techniques and new technologies with regards to understanding and defending against zero-day threats, propagating worms, low-and-slow attacks and advanced persistent threats (APT). Learn more.

Medical data breaches soar, according to study
Data breaches in healthcare organizations are rising more than 30 percent year over year, with most organizations stating they've been breached in the past year. Read More

Are the Carriers Spying On You?
I probably shouldn't be, but I was stunned to read this article from Atlantic Wire, mostly discussing some embedded (to the point of being invisible) software in some smartphones that provides analytical data to the carriers. Read More

Mobile privacy debate reignites over hidden smartphone app
New details on a hidden smartphone software application that collects data on user activities has sparked renewed debate over smartphone privacy. Read More

Real life HAL 9000 meets Skynet: AI controlled video surveillance society
Houston-based BRS Labs provides AISight software that offers the "first autonomous 24/7 behavioral analytics solution that analyzes video content, and alerts in real time on abnormal and suspicious activity." To put it another way, computer-controlled video surveillance cameras are the eyes watching us and, via artificial intelligence, the Read More



SLIDESHOWS

25 free open source projects IT pros will love
We asked SourceForge's new community manager and longtime open source coder, Rich Bowen, to sniff out a few of the cool, lesser-known projects he thinks IT folks will love. What follows are his picks, along with a few of our own.

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. 25 free open source projects IT pros will love
  2. Facebook under privacy watch for 20 years
  3. Everything I need to know about Linux I learned from my pets
  4. Mobile privacy debate reignites over hidden smartphone app
  5. Hackers launch millions of Java exploits, says Microsoft
  6. Hackers target IPv6
  7. Cisco data center forecast very cloudy
  8. Steve Jobs' worth, iPhone 5's arrival among 2011's top online question topics
  9. Google Translate glitch opens security hole
  10. Cool Yule favorites: 20 techie gifts we like

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: