Friday, September 26, 2014

The FBI’s big, bad identification system

Amazon readies major cloud server reboot | 8 cutting-edge technologies aimed at eliminating passwords

Network World Compliance

The FBI's big, bad identification system
"Image by ShutterstockThis month the FBI pronounced its powerful new crime fighting weapon -- the Next Generation Identification -- is at full operational capability. NGI replaced the Integrated Automated Fingerprint Identification System (IAFIS), the Bureau’s longstanding repository for fingerprints. But that’s not all it does. NGI uses a variety of high-tech tools and algorithms to combat all manner of offenses. Here we take a look at some of the tools the FBI will be using.To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: BMC Software

A New Opportunity for Capacity Planners
Mainframe software costs are the cost driver in many company's IT budgets and as such an increasing concern. We will describe the difficulty of managing an increasingly complex environment with limited data and small staffs and offer a methodology to safely and sanely identify achievable cost reductions. Learn More

WHITE PAPER: Guidance Software

How 3 Cyber Threats Transform the Role of Incident Response
While we still use many of the same old names- trojans etc.- today's malware enables potent multistage attacks called advanced persistent threats. This paper describes how malware enables these advanced persistent threats and how enterprise information security and incident response (IR) teams can employ cyberforensics tools to minimize the damage Learn more

Amazon readies major cloud server reboot
Amazon Web Services will be updating a substantial number of its cloud servers, and has asked customers to re-launch their instances in the coming days, according to AWS consultants.Amazon has not said why the reboot is happening, but AWS watchers believe it is to patch a security issue. The company will be updating many of its servers between Thursday, Sept. 25 at 10 PM ET and Tuesday Sept. 30 at 7:59 PM ET, according to Amazon partner and cloud consultancy RightScale.+ Also on NetworkWorld: Mapping the cloud: Where does the public cloud really live? +To read this article in full or to leave a comment, please click here Read More

8 cutting-edge technologies aimed at eliminating passwords
8 cutting-edge technologies aimed at eliminating passwords "Image by iStockphotoIn the beginning was the password, and we lived with it as best we could. Now, the rise of cyber crime and the proliferation of systems and services requiring authentication have us coming up with yet another not-so-easy-to-remember phrase on a near daily basis. And is any of it making those systems and services truly secure?To read this article in full or to leave a comment, please click here Read More

Virtualization, Cloud complicate insider threats for federal CIOs
Within the federal government, the shift toward virtualization and cloud computing is already well underway, but agency and industry officials warn that those migrations invite new security considerations, particularly in the form of insider threats.MORE ON NETWORK WORLD: Free security tools you should try Eric Chiu, president of the cloud and virtualization security firm HyTrust, notes the familiar list of arguments in favor of virtualizing servers and systems – lower costs and increased agility and efficiency chief among them – but points out that there are dangers associated with that transition.To read this article in full or to leave a comment, please click here Read More


: Guidance Software

SANS 2014 Survey of Endpoint Intelligence
SANS conducted its first Endpoint Security Survey by asking IT professionals how their organizations are monitoring, assessing, protecting and investigating their endpoints, as well as remediating breaches upon detection. Read the results in this report. SANS 2014 Survey of Endpoint Intelligence

Alabama schools secretly spying on students' social media after NSA called in a tip
Since when does the NSA make calls to schools after monitoring students’ social media posts? The NSA denies that it made such a call to Huntsville, Alabama, but the school superintendent initiated a “secret program to monitor students’ online activity” after allegedly receiving a tip from the NSA about students tweeting and posting violent threats on Facebook.It’s not surprising that the NSA would deny monitoring American students. NSA PR spokesman Vanee Vines said, "The National Security Agency has no record that it passed any information to the Huntsville school district, and the description of what supposedly occurred is inconsistent with NSA's practices." Vines added that the NSA focuses on foreign intelligence and "does not make recommendations regarding school safety programs.”To read this article in full or to leave a comment, please click here Read More

Internet scammers posing as Internet cops
Thinkstock Most people may not be familiar with the Internet Crime Complaint Center (IC3) but their ears are likely to perk when told it’s an operation sponsored by the FBI. And it’s the specter of being targeted by the FBI that makes this brazen email scam plausible.From an IC3 press release:     Victims report that the unsolicited e-mail sender is a representative of the IC3. The e-mails state that a criminal report was filed on the victim’s name and social security number and legal papers are pending. Scammers impersonate an IC3 employee to increase credibility and use threats of legal action to create a sense of urgency. Victims are informed they have one to two days from the date of the complaint to contact the scammers. Failure to respond to the e-mail will result in an arrest warrant issued to the victim.To read this article in full or to leave a comment, please click here Read More

'Bigger than Heartbleed' Shellshock flaw leaves OS X, Linux, more open to attack
Well, this isn't good. Akamai security researcher Stephane Chazelas has discovered a devastating flaw in the Unix Bash shell, leaving Linux machines, OS X machines, routers, older IoT devices, and more vulnerable to attack. "Shellshock," as it's been dubbed, allows attackers to run code on your machine after exploiting the flaw, but the true danger here lies in just how old Shell Shock is—this vulnerability has apparently been lurking in the Bash shell for years.Why this matters: A large swath of the web-connected devices, web servers, and web-powered services run on Linux distributions equipped with the Bash shell, and Mac OS X Mavericks is also affected. The fact that Shellshock's roots are so deep likely means that the vulnerability will still be found in unpatched systems for the foreseeable future—though the odds of it directly impacting you appear somewhat slim if you use standard security precautions.To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: Citrix Systems

Gartner Magic Quadrant for ADCs
Citrix is positioned in the Leaders Quadrant for Application Delivery Controllers for the seventh consecutive year: the Gartner Magic Quadrant Report focuses on vendor's ability to solve complex application deployment challenges. Don't miss this chance to learn from Gartner's independent research. Learn More

New organization sets out to make secure communication tools more user-friendly
Simply Secure will identify usability problems in open-source privacy tools and will work with developers to address them Read More

INSIDER
The care and feeding of a rockstar developer
Developers rule in the current tech landscape and have their choice of prime positions at any number of major companies. They appear to be on a promised path, with companies fighting for their services. The world is their oyster, so it seems.To read this article in full or to leave a comment, please click here(Insider Story) Read More

INSIDER
How to lure tech talent with employee benefits, perks
Flexibility is key as employers try to beef up their benefits packages and attract in-demand workers. Read More


SLIDESHOWS

The wild world of workplace wearables

Here are some examples of wearables coming to a variety of vertical industries.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Microsoft rolls out free Office 365 for Students, but hits activation snag

2. Apple yanks buggy iOS 8 update

3. Why Cisco lost two key officials in data center, cloud

4. iOS 8 tips and tricks you need to know

5. No, Apple's iPhone 6 Plus isn't too big

6. 10 (mostly) free Exchange admin tools

7. First Look: BlackBerry Passport

8. Networking pioneer Bob Metcalfe hails Ethernet-as-a-Service effort

9. 12 predictions for the future of programming

10. Ex-Cisco employee pleads guilty to second-degree murder in 'Google Maps case'


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


1 comment:

  1. replica bags toronto gucci fake j9r03k4r36 replica bags new york view l6t72s2m95 replica louis vuitton bags replica bags toronto u1k26x6c86 replica bags vancouver hermes replica handbags f2y13b8q23 7a replica bags philippines

    ReplyDelete