Wednesday, March 28, 2012

Hackerazzi man pleads guilty to targeting celebrities Scarlett Johansson, Mila Kunis, 50 others

Microsoft co-founder Paul Allen's identity stolen by AWOL soldier | Are Open Source Libraries Any More Vulnerable Than Closed Source?

Network World Security

Forward this to a Friend >>>


Hackerazzi man pleads guilty to targeting celebrities Scarlett Johansson, Mila Kunis, 50 others
In a highly publicized case last year, a Florida man this week pleaded guilty to hacking into the personal e-mail accounts of more than 50 actors including Scarlett Johansson, Mila Kunis, Renee Olstead. Specifically Christopher Chaney, 35, pleaded guilty to nine felony counts of a 28-count indictment, including unauthorized access to protected computers, wiretapping and wire fraud, unauthorized damage... Read More


WHITE PAPER: SonicWALL

Smart Security for Escalating Challenges
This eBook examines how CSOs and IT managers are solving these issues using next-generation firewalls. Read now.

WHITE PAPER: NetIQ

SANS Review of NetIQ Sentinel 7
A SIEM solution fully installed and capturing logs in under 15 minutes! Read how SANS analyst Jerry Schenk did it, and why he feels NetIQ Sentinel 7 is a great solution for the most pressing security problems facing enterprises today. Learn More!

Microsoft co-founder Paul Allen's identity stolen by AWOL soldier
An AWOL soldier living in Pittsburgh has been charged with stealing the identity of Microsoft co-founder Paul Allen and using his credit card account to make a $658.81 payment on a loan from Armed Forces Bank. Read More

Are Open Source Libraries Any More Vulnerable Than Closed Source?
My friend and Network World editor, Ellen Messmer posted an article yesterday about the results of an analysis by Aspect Security of the Central Repository maintained by Sonatype. The study was announced by Aspect and Sonatype yesterday. Read More

Counterterrorism database stores all Americans as potential domestic terrorists
Terrorism is not a 4-letter cuss word, but it might be a curse word . . . a five year curse on every American citizen that is. By using terrorism as a justification, the government will collect and store personal information on Americans who have absolutely no ties to terrorism and are suspected of no crime. Your info will be dumped into a database and stored for five years. Why? So U.S. Read More


WHITE PAPER: Oracle

Sustainable Compliance for the Payment Card Industry
This white paper explains the essentials of a PCI DSS compliance program, focusing on the critical but problematic areas that comprise much of the heart of the requirements. Learn More!

16 ultimate SSH hacks
So you think you know OpenSSH inside and out? Test your chops against this hit parade of 16 expert tips and tricks, from identifying monkey-in-the-middle attacks to road warrior security to attaching remote screen sessions. Follow the countdown to the all-time best OpenSSH command! Read More

Security Firm AVG Releases Do-Not-Track Feature for Windows
If the recent debates around the Federal Trade Commission's call for a Do-Not-Track tool have you concerned about online privacy, computer security firm AVG recently announced a new do-not-track feature for Windows. AVG's new tool is available to users of its free and paid security products as a free update. New users can get the tool by downloading AVG Anti-virus Free Edition, and then running a program update to get the new do-not-track feature. The new tool works as an add-on with Internet Explorer, Mozilla Firefox and Google Chrome browsers. Read More

Facebook making the right noises on password privacy
Facebook has a message for creepy bosses who ask their workers for their Facebook passwords: You're icky, we don't like you, and we reserve the right to sue you. Check out this note posted late last week by Facebook chief privacy officer Erin Egan: Read More


WHITE PAPER: Tripwire

Responding to New Threats in More Complex IT Environments
As organizations today face the challenge of protecting their valuable data, they must balance that protection with giving business users and customers access to the data. Learn More!

FTC chairman: Do-not-track law may not be needed
A do-not-track law focused on protecting Web users' privacy may not be necessary, with private groups working to implement recommendations from the U.S. Federal Trade Commission, the agency's chairman said Monday. Read More

A quick look: The Angry Birds phenomenon
From space to Rio, the Angry Birds game seems to be out to conquer the world Read More

If it ain't broke, don't fix it: ancient computers in use today
From 1970s minicomputers used for military programs (including nuclear weapons) to an IBM punch-card system still keeping the books at a Texas filter supplier, these are the computers that time forgot. Read More



SLIDESHOWS

20 iPad business apps every CIO should want
iPad apps for sales forces, IT departments and more.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Firewall fail: A tale both funny and sad
  2. Microsoft apologizes after botched Windows Phone challenge
  3. Big news for IPv6: Akamai to launch service in April
  4. Open source code libraries seen as rife with vulnerabilities
  5. Arista embeds applications into Ethernet switch
  6. 20 iPad business apps every CIO should want
  7. Top 10 cool and useful Google Maps Mashups
  8. Designing 'iPad WLANs' poses new, renewed challenges
  9. FTC issues Privacy Report, calls for Do-No-Track tool
  10. Microsoft's challenge: Scaling Windows 8 across different screen sizes

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment