Tuesday, September 04, 2012

Microsoft raises privacy issues with tweaked TOS to share data across the cloud

Is Your ISP Spying On You? | Disclosure of Java zero-day prompted Oracle patch, says researcher

Network World Security

Forward this to a Friend >>>


Microsoft raises privacy issues with tweaked TOS to share data across the cloud
Once upon a time, or about two weeks ago, when talking about the new Skydrive.com and why versatility in cloud storage is so important, Microsoft stated, "We believe that your files are not just bits to be synced—and they're certainly not to be scanned to serve advertising. Read More


WHITE PAPER: McAfee

Top 4 Security Surprises That Await Private Cloud Builders
This report published by Gabriel Consulting Group discusses security risks that prospective private cloud builders might be overlooking. Learn more.

WHITE PAPER: McAfee

What's Holding Back the Cloud?
This report captures key findings from a blind survey of 800 IT professionals in four countries — China, Germany, the United Kingdom and the United States — that provide insight into cloud computing security concerns, and how those concerns might be alleviated. Learn more in the McAfee Securing Cloud-Based Services KnowledgeVault. Learn more.

Is Your ISP Spying On You?
Arcticsid asked the Answer Line forum if his ISP can "sit back...watch a screen, and see everything you are doing at any given time?" Read More

Disclosure of Java zero-day prompted Oracle patch, says researcher
Oracle released an emergency patch on Thursday for previously unknown Java vulnerabilities that cybercriminals had targeted with popular exploit kits within hours after the bugs' existence became public. Read More


WHITE PAPER: IBM

How to Justify the Cost of a TMS
Read this white paper to learn how implementing a service-based TMS, together with a well designed freight audit and payment module help reduce your transportation spend. Learn More

Rogue Microsoft Services Agreement email notifications lead to latest Java exploit
Hackers are distributing rogue email notifications about changes in Microsoft's Services Agreement to trick people into visiting malicious pages that use a recently circulated Java exploit to infect their computers with malware. Read More

Manual examines how international law applies to cyberwarfare
A cybersecurity think tank has published a manual studying how international law applies to conflicts in cyberspace, where the laws of conventional warfare are more difficult to apply. Read More


WHITE PAPER: CA Technologies

Delivering Exceptional Applciation Experience
Enterprises can achieve customer advantage by monitoring the quality and timeliness of mission-critical applications. Read this whitepaper to learn how with CA Technologies Application Performance Management solutions. Learn More

Vaguery of 'freedom' in GOP tech platform worrying
Expecting the private sector to guard privacy doesn't add up because it makes money from personal information, one expert cites as example Read More

How to catch a tumbling, aging satellite
How do you catch a speeding, tumbling, aging satellite? Very carefully. Levity aside, the question is central to the plan scientists at DARPA have for catching up to and grabbing old satellites in an effort to ultimately refurbish and reuse the systems. Read More

Toyota accuses fired worker of major security breach
Car maker Toyota has filed a lawsuit against a worker it claims attacked the company's US parts supply website as retribution for being fired. Read More



SLIDESHOWS

Tech CEOs' first jobs: Licorice maker, housekeeper, scuba diver and more
Before their corporate jobs, many tech CEOs got their hands dirty, scrubbing oils stains off asphalt, cleaning bathrooms, and shoveling monkey cages. Here are their stories.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Hottest Android news and rumors for the week ending Aug. 31
  2. 10 Cisco executive departures over the past year
  3. Yes, Apple won, but what did it actually win?
  4. The security skills shortage is worse than you think
  5. Mysterious Wiper malware possibly connected to Stuxnet and Duqu, researchers say
  6. Windows 8 is awesome ...
  7. 18 great IT tools for Android
  8. 5 reasons Android users will switch to the iPhone 5
  9. Java security threats: What you need to know
  10. Toyota accuses fired worker of major security breach

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment