Search This Blog

Thursday, August 02, 2012

In face of breaches, malware, unscrupulous users, US needs to update online privacy protection

  Microsoft warns of critical Oracle code bugs in Exchange | 'Anonymous' turns in hacker who targeted children's charity
 
  Network World Security

Forward this to a Friend >>>


In face of breaches, malware, unscrupulous users, US needs to update online privacy protection
The fast moving world of Internet time has left the federal government behind when it comes to protecting your private information. MORE: The weirdest, wackiest and coolest sci/tech stories of 2012 (so far!) Read More


WHITE PAPER: Oracle

Experience a Smooth and Swift Backup
Virtually every company, regardless of size or industry, needs data archive capabilities. Datacenter administrators across all industry segments face similar archive challenges. Learn More!

WHITE PAPER: Aerohive

The iEverything Enterprise
Virtualization, cloud computing, and wireless technology are fundamentally changing enterprise computing, providing revolutionary gains in productivity and cost savings. Powerful enterprise applications can now be delivered to almost any device, anywhere, at any time. Learn more.

Microsoft warns of critical Oracle code bugs in Exchange
Microsoft last week warned IT administrators that critical vulnerabilities in code licensed from Oracle could give attackers access to Exchange Server 2007 and Exchange Server 2010 systems. Read More

'Anonymous' turns in hacker who targeted children's charity
A hacker who disabled the website of a New Zealand company dedicated to helping feed poor children could face legal consequences in his home country of Spain after his attack spurred a Facebook/Twitter posse and incurred the wrath of members of Anonymous, who he may have been trying to impress. Read More


WHITE PAPER: ADTRAN

Traditional WLAN vs. ADTRAN's Virtual Wireless LAN (vWLAN)
The substantial differences between a traditional hardware controller-based wireless LAN and ADTRAN's virtual wireless LAN (hypervisor-based) are detailed in ADTRAN's WLAN vs. vWLAN comparison chart. Learn more.

Your Smartphone is a Spy for the Government
Tens of thousands of times a year, federal courts issue orders to let the government obtain cell phone and email records -- and they do it in secret. What happened to our right to privacy? Read More

Hackers increasingly aim for cross-platform vulnerabilities
Hackers are increasingly targeting the same application vulnerabilities on Macs and Windows PCs as a way to reap the financial benefits of writing cross-platform malware Read More


WHITE PAPER: Motorola

WiNG 5 Wireless LAN: Delivering Better Quality of Experience
Can your wireless network infrastructure handle the growing numbers of mobile devices taking significant bandwidth bites out of your network? The good news is that with smart, cost-effective wireless infrastructure investments, not only can you scale quickly to secure the growing number of devices you serve, but also optimize their performance. Learn More.

White House pushes for stalled cybersecurity bill
It's urgent for the U.S. Senate to pass a cybersecurity bill now stalled because of opposition from several lawmakers, officials from the U.S. White House said Wednesday. Read More

Perfect, persistant, undetectable hardware backdoor
We've heard a lot about nation states attacking us for intellectual property, such as secretly walking away with millions of dollars in American research and development, but a proof-of-concept presentation from Def Con touched on potential agendas such state level pe Read More

 
 
 

SLIDESHOWS

12 new network features in Windows 8
There are a bunch of new and impressive administrative features designed to increase network support, reliability, performance, and security.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Microsoft kissing Hotmail goodbye
  2. IBM attempts to redefine the IPS
  3. New data center design boasts 'world's most efficient cooling system'
  4. Following Xsigo acquisition, Oracle becomes the Apple of enterprise IT
  5. Outsourcers apparently don't miss a beat in face of massive India power outage
  6. Leaked Windows Phone 8 SDK brings app surprises
  7. In face of Flame malware, Microsoft will revamp Windows encryption keys
  8. Netflix uncages Chaos Monkey disaster testing system
  9. Meet the new email boss Outlook.com, not the same as the old boss Hotmail
  10. iPhone 5 unveiling set for Sept. 12, rumors claim
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: