Thursday, December 06, 2012

'Everyone in US under virtual surveillance;' Are you sure you have nothing to hide?

  Pinkie Pie hacker strikes again; Google repairs two major Chrome vulnerabilities | The year in madly cool robots
 
  Network World Security

Forward this to a Friend >>>


'Everyone in US under virtual surveillance;' Are you sure you have nothing to hide?
"NSA Whistleblower: Everyone in US under virtual surveillance, all info stored, no matter the post," reported RT after interviewing William Binney. RT said this is being done under the "Terrorist Surveillance Program" which is probably better known as NSA warrantless wiretapping. But Binney also named and blamed the FBI this time: Read More


WHITE PAPER: Avaya

Delivering game-changing productivity & dependability
By creating one contiguous, end-to-end Fabric, Avaya is empowering businesses to achieve unprecedented levels of infrastructure productivity, service agility, and network dependability, the very essence of the fast, flexible, and secure design aspirations. Read Now

RESOURCE COMPLIMENTS OF: Ipswitch

Wired & Wireless Networks? WhatsUp Gold can help!
As an IT manager, you're busy taking care of the availability, performance & security of your company's IT infrastructure. But things like BYOD, rogue devices, AP over-subscription & bandwidth policy abuse can make that complex. WhatsUp Gold provides ONE dashboard to visualize, isolate & resolve wireless problems before they impact your organization. Stop being the last to know about your wireless issues- Try WhatsUp Gold free for 30 days!

Pinkie Pie hacker strikes again; Google repairs two major Chrome vulnerabilities
The Chrome hacker known as "Pinkie Pie" helped reveal a serious flaw in the browser's media handler that was patched last week with the release of Chrome 23. That update also fixed a file path handling problem, which was discovered by Google's in-house researchers. Read More

The year in madly cool robots
From giants to itsy-bitsy shape shifters, robots are hot Read More

Report Warns Feds of Radicals and Extremists on Social Web
Bipartisan Policy Center study outlines steps the government can take to crowd out extremist messages on the Web, including a clearer legal framework for law enforcement, while warning against censorship or content filtering. Read More


WEBCAST: PhoneFactor

Strong Security for Remote Workers Is Just a Phone Call Away
Join Steve Dispensa, PhoneFactor Chief Technology Officer, and Sarah Fender, PhoneFactor Vice President of Marketing & Product Management, to learn how phone-based authentication is helping companies tackle complex authentication challenges. Learn More

Twitter fix for bug that left accounts open to imposters less than ideal
Use of a short code to stop attackers leaves out a significant number of Twitter users, including those in the U.S. Read More

Killer robots, indestructible drones & drones that fly and spy indefinitely
Lions and tigers and bears have nothing on "killer robots," "indestructible drones" and drones that fly and spy indefinitely. Read More

Civil litigation: A better way to improve cybersecurity?
Former Homeland Security officials says settlement in Patco online banking suit is evidence that liability is better than legislation Read More


WHITE PAPER: Brocade

Scaling Out Data Centers
Organizations of all sizes are facing daunting challenges as they struggle to adapt their data center networks to new technologies and applications. The move toward cloud architectures in particular is demanding a high-performance network interconnect that can host servers potentially numbering in the thousands. Read Now

Online Security Basics for Small Business Websites
Everyone on the Web is a target for scams, malware, piracy and a host of other online security dangers. Small business owners are no exception. These tips will help you protect your website, your assets and your information. Read More

Twitter fixes SMS-based account hijacking vulnerability
Twitter has restricted the ability of attackers to post tweets and perform other actions on behalf of many users who have phone numbers associated with their accounts, but some users need to enable a PIN option in order to be protected. Read More

Attackers can abuse Yahoo developer feature to steal user emails, other data
Attackers can read emails, contacts and other private data from the accounts of Yahoo users who visit a malicious page by abusing a feature present on Yahoo's Developer Network website, according to an independent security researcher. Read More

 
 
 

SLIDESHOWS

10 cloud predictions for 2013
2013 is the year that companies need to implement a serious cloud strategy that puts certain workloads in the public cloud and retains other workloads in-house.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Google Ingress: How to save the world with your Android phone
  2. Cisco Catalyst 6500 vs. Cisco Nexus 7000
  3. The 14 most influential smartphones ever
  4. Apple TV and iTunes update news for cord-cutters
  5. Microsoft may have some Windows Phone 8 momentum after all
  6. 2013 IT salaries: 15 titles getting the biggest pay raises
  7. 14 of the most useful Linux websites
  8. Apple iOS vs. Google Android: It comes down to security
  9. Turbo-charge your browser with these top add-ons
  10. Tablet smackdown: iPad vs Surface RT in the enterprise
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment