Search This Blog

Friday, November 02, 2012

FTC escalates anti-robocall campaign – takes out 5 mass callers

  Unprotected Apache server status pages put popular websites at risk | Hitting back at cyberattackers: Experts discuss pros and cons
 
  Network World Security

Forward this to a Friend >>>


FTC escalates anti-robocall campaign – takes out 5 mass callers
Just two weeks after it challenged the public to come up with a better technological way to stop incessant robocalling, the Federal Trade Commission pulled the plug on five mass calling companies it said were allegedly responsible for millions of illegal pre-recorded calls from "Rachel" and others from "Cardholder Ser Read More


WHITE PAPER: Dell SonicWall

Why Protection and Performance Matters
Outdated firewalls can pose serious security risks and simply adding malware protection inhibits performance. Dell SonicWALL Next-Generation Firewalls overcome these limitations with multi-core architecture and Reassembly-Free Deep Packet Inspection for unrivaled protection and performance. Read Now!

RESOURCE COMPLIMENTS OF: LogMeIn

LogMeIn Central: Automate, Monitor and Manage PCs.
LogMeIn lets you Monitor and Manage PCs, deliver patches and updates to multiple PCS simultaneously. Central helps IT deliver seamless support that keeps employees productive and up and running. LogMeIn Central - automate routine tasks and do more. Free Trial

Unprotected Apache server status pages put popular websites at risk
Many Apache Web servers, including those hosting some popular websites, expose information about the internal structure of the sites they host, the IP (Internet Protocol) addresses of their visitors, the resources users access and other potentially sensitive details because their status pages are left unprotected. Read More

Hitting back at cyberattackers: Experts discuss pros and cons
The questions are being asked more often: When a cyberattack hits your network, is it right to launch a counter-attack of some type to try to at least identify the source if not stop it? Since the wheels of justice do indeed grind slowly, should frustrated IT professionals with security skills take matters into their own hands or hire others to do so? Read More

Security research labels more than 290,000 Google Play Android apps as 'high-risk'
One-quarter of more than 400,000 Android apps examined in the Google Play store pose security risks to mobile-device users, according to new research. Read More


WHITE PAPER: Cisco Systems

Forrester: Virtualization and the Mobile Workspace
How will you meet evolving security requirements? Discover IT approaches to BYOD and other workspace challenges in a Forrester study that examines policy management, desktop virtualization and mobility solutions. Read Now

Hacker forums used to induct new criminals, report finds
Hacker forums have become a critical global channel through which aspiring criminals are inducted into the ranks of professional cybercrime, an analysis of some of the most popular discussion sites by security company Imperva has found. Read More

Malware infects 13 percent of North American home networks
Some 13 percent of home networks in North America are infected with malware, half of them with "serious" threats, according to a report released Wednesday by a cyber-security company. Read More

Privacy experts criticize moves to sidestep IE10's default Do Not Track settings
When it comes to consumers' rights to control their own browsers, everybody wants to sound like they're pro-choice. But with many millions of advertising dollars on the line, the definition of pro-choice tends to align with the financial interests of those doing the defining. Read More


WHITE PAPER: Oracle

Optimizing the Datacenter
By embracing application and server consolidation strategies, IT managers can gain real efficiencies that lower costs and streamline operations. Oracle's servers offer the scalability required to tackle consolidation projects. Learn More

12 effective habits of indispensable IT pros
Ditch the slackers, take on dirty work, do it with data -- here's how to get the inside track on a highly rewarding career in IT Read More

One year after DigiNotar breach, Fox-IT details extent of compromise
The 2011 security breach at Dutch certificate authority (CA) DigiNotar resulted in an extensive compromise and was facilitated in part by shortcomings in the company's network segmentation and firewall configuration, according to Fox-IT, the security company contracted by the Dutch government to investigate the incident. Read More

Big Brother Surveillance Secrets Have Practically Outlawed Privacy
Despite the wrath of Hurricane Sandy, the Supreme Court heard the ACLU argue for the right of Americans to challenge warrantless wiretapping via the FISA Amendment Act law. Read More

 
 
 

SLIDESHOWS

First look: Windows 8 Surface RT
Surface RT, the Microsoft-built tablet/notebook, offers a sleek design and sturdy feel.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Stolen cell phone database switched on in U.S.
  2. 12 effective habits of indispensable IT pros
  3. Researcher warns "zombie browsers" are skyrocketing
  4. The 7 scariest monsters in tech
  5. Thin client vendor Pano Logic disappears into thin air
  6. VMware, the bell tolls for thee, and Microsoft is ringing it
  7. .xxx to launch porn search engine
  8. Irked by cyberspying, Georgia outs Russia-backed hacker -- with photos
  9. Caveats for VPM users in public Wi-Fi hotspot networks
  10. iPad mini: "It's the future until May ... at least" (Apple spoof video)
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: