Friday, January 24, 2014

12 privacy-destroying technologies that should scare you

Network World Compliance - Newsletter - networkworld.com
TrustyCon vs. RSA and NSA: New conference pushes trustworthy agenda | Start-up debuts 'shape-shifting' technology to protect web servers

Network World Compliance

Forward this to a Friend >>>


12 privacy-destroying technologies that should scare you
Technology is not evil, only its use or misuse. But in the case of this dirty dozen, the potential for abuse is frightening. Read More


WHITE PAPER: HP and Intel® Xeon® processors

Future-Proofing Your Data Center Storage
Learn how investing in increased flexibility and automation can provide additional agility for businesses to respond to new opportunities quickly. Learn More

WHITE PAPER: Mitel Networks

The Business Case for Cloud-Based Unified Communications
This detailed guide helps leaders develop a clear understanding of how to gain the full benefits of unified communications while minimizing all three of these investment parameters. Learn More

TrustyCon vs. RSA and NSA: New conference pushes trustworthy agenda
Who do you trust? That's a question asked increasingly by a security industry with a growing sense that the National Security Agency (NSA) has sought to weaken encryption or get backdoors into computers, based on documents leaked by Edward Snowden to the media. Now, trust is also the theme of a new conference called TrustyCon that will vie for attention on Feb. 27 in San Francisco while the big RSA Conference for security pros is also taking place in that city. Read More

Start-up debuts 'shape-shifting' technology to protect web servers
Backed by a lineup of elite investors, start-up Shape Security comes out of stealth mode today by announcing technology it calls Shapeshifter that is said to prevent cyber-criminals from successfully attacking and compromising websites. Read More

The 25 worst passwords of 2013: 'password' gets dethroned
"123456" is finally getting some time in the spotlight as the world's worst password, after spending years in the shadow of "password." Read More


WHITE PAPER: Riverbed Technology

How WAN Optimization Can Drive Top-Line Revenue
A convergence of trends is creating a perfect storm for IT professionals tasked with providing secure, reliable access to applications and other critical corporate information. These potentially conflicting trends are putting a strain on corporate networks as more users attempt to access desktop infrastructures. View Now

Firewall start-up Aorato sniffs out Active Directory anomalies
Start-up Aorato comes out of stealth mode today with what it calls a firewall designed to protect Microsoft Active Directory shops. Read More

Start-up takes on threat detection and intelligence-sharing for the enterprise
Start-up Confer recently debuted with software and services aimed at detecting stealthy malware and attackers targeting enterprise servers, laptops and mobile devices. Though market competition is fierce, Confer believes it can win through its application behavior-analysis approach and its cloud-managed threat-intelligence platform that makes use of the open protocol called STIX. Read More

How to securely get started using SDN
Though some might argue that it's inherently insecure, SDN has changed for the better in recent years, allowing it to be implemented securely Read More


WHITE PAPER: Riverbed Technology

Optimizing Mobile Client Performance
As mobile devices continue to expand in business use, ensuring these devices have optimal performance is becoming an IT imperative. This EMA paper examines mobile client accelerators. It provides an overview of how the technology works, its business benefits and cites three examples of real-world use cases and their individual costs and ROI. Read More

Google dismisses eavesdropping threat in Chrome feature
Google said there's no threat from a speech recognition feature in its Chrome browser that a developer said could be used to listen in on users. Read More

US federal watchdog calls for end to NSA phone records program
In a report to be released Thursday, the U.S. Privacy and Civil Liberties board says the National Security Agency's bulk collection of phone records is illegal and should stop, according to the New York Times and the Washington Post, which received advance copies of the document. Read More

Why I did it: Former hacker Mitchell Frost explains his motivation
In 2006, Mitchell Frost, then a 19-year-old college student at the University of Akron, used the school's computer network to control the botnets he had created. Authorities say between August 2006 and March 2007, Frost launched a series of denial of service (DDOS) attacks against several conservative web sites, including Billoreilly.com, Anncoulter.com and Rudy Giuliani's campaign site, Joinrudy2008.com. He is accused of taking down the O'Reilly site five times, as well as disrupting the University of Akron's network during a DDOS attack Frost allegedly launched on a gaming server hosted by the university. Read More

Some Tor exit nodes attempt to spy on encrypted traffic, researchers find
Computer scientists found almost 20 exit relays in the Tor anonymity network that attempted to spy on users' encrypted traffic using man-in-the-middle techniques. Read More

10 oddball real-world tech job interview questions
You better know your pizza… Read More


SLIDESHOWS

30 years of Apple's Mac computer

A visual history of the Mac..

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Modern PCs that run the Windows you really want

2. Why VMware spent $1.5B on AirWatch

3. Windows 9 rumors freeze corporate Windows 8 uptake

4. How Apple and Pepsi fumbled their 2004 Super Bowl ad play

5. Lenovo agrees to buy IBM's server business for $2.3 billion

6. Top 25 most commonly used and worst passwords of 2013

7. Boycotting RSA Conference is a misplaced endeavor

8. 12 privacy-destroying technologies that should scare you

9. Better than TV! White spaces bring wireless bonanza to West Virginia

10. SDN showdown: Examining the differences between VMware's NSX and Cisco's ACI


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment