Friday, June 29, 2012

Anonymous and LulzSec: 10 greatest hits

FTC goes after Wyndham for data beaches at its hotels | Study: 86% of top websites expose visitors to third-party tracking cookies

Network World Security

Forward this to a Friend >>>


Anonymous and LulzSec: 10 greatest hits
A look at 10 of the more notorious acts of hacktivism by Anonymous and LulzSec Read More


WHITE PAPER: HP & Intel

Getting Schooled on Next-Generation Mobility
This whitepaper discusses how K-12 districts can unleash the freedon that Wi-Fi affords then in learinging and administration, by embracing sophisticated WLANS. It provides an overview of wireless learning, the HP Advantage, protecting students/data, easing and unifying managemnet and how to lower TCO. Read Now!

WHITE PAPER: Aerohive

The iEverything Enterprise
Virtualization, cloud computing, and wireless technology are fundamentally changing enterprise computing, providing revolutionary gains in productivity and cost savings. Powerful enterprise applications can now be delivered to almost any device, anywhere, at any time. Learn more.

FTC goes after Wyndham for data beaches at its hotels
A little over a month after the FBI warned travelers of an uptick in data being stolen via hotel Internet connections, the Federal Trade Commission has filed a complaint against Wyndham Worldwide Corporation and three of its subsidiaries for alleged data security failures that led to three data breaches at Wyndham hotels in less than two years. Read More

Study: 86% of top websites expose visitors to third-party tracking cookies
How prevalent is the use of tracking cookies that get planted on your computer after browsing a website so it can keep track of what you're doing? Turns out that not only do the major websites like to plant their own tracking cookies on you, they're also happy to stick a lot of third-party cookies on you, too. Read More


WHITE PAPER: HP

Bring Your Own Mobile Devices to School
In today's educational environments, more and more students, guests, and faculty are bringing in their own Wi-Fi devices into the school's network. This paper discusses the challenges and solutions IT administrators are facing and how to address the security and management of the multiple devices being introduced into the wireless/wired network. Learn more.

US Navy's high-resolution radar can see individual raindrops in a storm
The US Naval Research Laboratory (NRL) researchers said recently that a Navy very high-resolution Doppler radar can actually spot individual raindrops in a cloudburst, possibly paving the way for new weather monitoring applications that could better track or monitor weather and severe storms. In the news: Hot high-tech thingamajigs Read More

GOP Senators revise cybersecurity bill
A group of Republican Senators introduced on Wednesday a revised version of a previously proposed bill that seeks to improve cybersecurrity through improved information sharing between private industry and government. Read More


WHITE PAPER: Motorola

WiNG 5 Wireless LAN: Delivering Better Quality of Experience
Can your wireless network infrastructure handle the growing numbers of mobile devices taking significant bandwidth bites out of your network? The good news is that with smart, cost-effective wireless infrastructure investments, not only can you scale quickly to secure the growing number of devices you serve, but also optimize their performance. Learn More.

Wickr, a mobile privacy application, sweeps digital crumbs away
A new mobile application for Apple devices called Wickr lets people exchange files and messages without leaving digital traces that could be examined by law enforcement or cyberspies. Read More

Report: Dutch government was unprepared for SSL hack
The Dutch government was unprepared to handle an SSL hack that caused the government's communication infrastructure to be vulnerable for months, the Dutch Safety Board said in report on Thursday. Because the government was unable to replace the certificates immediately, citizen and company data was left unsecured, the board said. Read More

Universal key management for the cloud
Data protection processes like encryption and tokenization tend to create a lot of objects like keys and tokens that require their own level of security and protection. As companies migrate to cloud computing, they may suffer from "key sprawl": having numerous key management solutions and token vaults to administer. Now there's a new universal key management solution on the market that is purpose-built to secure keys, tokens, certificates, passwords, etc. all in one secure system. Read More

If you like art from Chagall, Matisse, Picasso and Toulouse-Lautrec your US Marshals have a deal for you
The U.S. Marshals Service today said it will hold online auctions to sell 245 works of art by Chagall, Matisse, Picasso, Toulouse-Lautrec and other old masters as well as pieces by more recent famous artists between now and July 7. Read More



SLIDESHOWS

Top CIOs take home seven-figure pay packages
Fortune 500 CIOs and IT SVPs netted multimillion dollar compensation packages in 2011.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Google's computerized glasses steal the show at I/O
  2. Five years ago they said the iPhone would be a flop ... Now?
  3. U.S. retires famous Red Storm supercomputer
  4. FTC goes after Wyndham for data breaches at its hotels
  5. First look -- Googe's new Nexus 7 tablet
  6. Cisco adds 802.11ac, cloud features to new home router
  7. The 10 most demanding jobs in IT
  8. A look back: Steve Ballmer laughs at the iPhone
  9. Resurrecting HP Touchpads by rooting them, installing Android
  10. Does two-factor authentication need to be fixed?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment