Tuesday, January 24, 2012

A quick look: The Megaupload Kim Dotcom hullabaloo

Supreme Court: GPS tracking needs court warrant | Hacker releases 100,000 Facebook log-in credentials

Network World Security

Forward this to a Friend >>>


A quick look: The Megaupload Kim Dotcom hullabaloo
Megaupload.com's CEO Kim Dotcom is at the center of file sharing website's battle with the US over copyright, pirating and money laundering charges Read More


RESOURCE COMPLIMENTS OF: LogMeIn

Provide instant on-demand remote support with LogMeIn Rescue
Without pre-installed software, quickly connect to PCs, Macs, smartphones and tablets anywhere in the world. Get in, solve the problem, and be done in a flash. Plus, Rescue's SaaS-based platform means free upgrades and zero maintenance. Try it free today.

WHITE PAPER: CA Technologies

Tackling the New Normal: Unified Infrastructure Management
The new normal for IT is change; and it's up to you to keep pace with that change. You need to leverage innovations—like cloud and mobility—with a cohesive approach to management that ensures full visibility and control across the infrastructure. Learn More

Supreme Court: GPS tracking needs court warrant
U.S. law enforcement agents need court-approved warrants to track a suspect's whereabouts using a GPS device, the U.S. Supreme Court said Monday, in deciding a burning issue where privacy intersects with modern technology. Read More

Hacker releases 100,000 Facebook log-in credentials
A hacker who claims to act in defense of Israel has released 100,000 credentials of allegedly Arab users of Facebook in an ongoing row between Israeli and Arab hackers. Read More


WEBCAST: NetIQ

Disaster Recovery Planning and the Cloud
Find out how virtualization is the stepping stone to the cloud and how to leverage virtualization technologies today to reduce the cost and improve the performance of your disaster recovery plan. Learn More!

Mobile data: Are you carrying a suitcase or a safe?
If you were packing for a trip and needed to take reams of documents with personal data, such as bank statements and medical bills, would you rather put them in a suitcase or a safe? Read More

Encrypted SSDs deliver security, speed
Solid state replacement drives can protect laptop data in case of lost or stolen device Read More


WHITE PAPER: NetSupport Inc

Reducing Hidden Operating Costs Through IT Asset Discovery
After reductions in headcount and procurements have been made, cost-cutting strategies are now turning to internal operations, and many IT decision makers are taking a closer look at indirect, or "soft," costs within these departments. Learn More

The Oracle flaw: Clarifications and more information
In the wake of InfoWorld's exclusive story on a flaw in Oracle's flagship database product, Oracle weighs in and new developments emerge Read More

Do you need a cyberumbrella?
If your company were hit with a cyberattack today, would it be able to foot the bill? The entire bill, including costs from regulatory fines, potential lawsuits, damage to your organizations' brand, and hardware and software repair, recovery and protection? Read More

Out with SOPA, in with cloud
Count us among the critics of SOPA and PIPA, the two ill-conceived bills that were intended to protect American firms against copyright infringement by foreign websites. Read More

London 2012 Olympics will see massive wireless spectrum consumption
The 2012 Olympic games in London are going to need a massive spectrum outlay - some 20,000 separate wireless frequency assignments which is more than double the number usually assigned in a year - to handle the expected communications requirements. More news: Kodak: A look at the icons of an icon Read More



SLIDESHOWS

12 available devices to test drive Windows 8
Here are a dozen off-the-shelf devices that Microsoft says it uses in its labs to put Windows 8 through its paces. You, too, can buy one if you haven't already.

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. 2012's 25 geekiest 25th anniversaries
  2. First look: Windows 8 breaks new ground
  3. Anonymous dupes users into joining Megaupload attack
  4. Google kills more services
  5. iPad 3 rumor rollup for the week ending Jan. 18
  6. Another reason for Cisco to pound its chest
  7. LTE spectrum: How much do the big carriers have?
  8. How to profit from new domain name rules
  9. Thorsten Heins takes over as CEO at Research in Motion
  10. Can employee-owned devices save companies money?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment