Friday, May 07, 2010

Consumer groups hammer Facebook on privacy; Sophos getting bought

Sophos founders in $300 million buyout deal | Wi-Fi key-cracking kits sold in China mean free Internet

Network World Compliance

Forward this to a Friend >>>


Consumer groups hammer Facebook privacy violations in federal complaint
Detailed legal complaint against Facebook alleges privacy violations stemming from recent feature changes. Read More


WHITE PAPER: Adobe

Close the Web 2.0 Communications Gap
Web 2.0 tools have yet to reach critical mass and broad user adoption. This Forrester report identifies the key Web 2.0 gaps and offers advice to: Build a framework that extends email, Upgrade document-based data collection, and Improve email and document exchange security. Read More

In this Issue


WHITE PAPER: Splunk

Make IT Data a Strategic Asset
This paper outlines the struggles organizations face managing silos of IT data and how, using Splunk, users are changing the way they do their jobs and elevating the role of IT in their organizations. Learn More!

Sophos founders in $300 million buyout deal
Sophos, the UK-based security and data protection firm, has dropped plans for an IPO and has announced a deal to sell a majority interest in the company to private equity group Apax Partners. Read More

Wi-Fi key-cracking kits sold in China mean free Internet
Dodgy salesmen in China are making money from long-known weaknesses in a Wi-Fi encryption standard, by selling network key-cracking kits for the average user. Read More

Facebook security flaw makes private chats public
Facebook is dealing with the fallout of a security hole that gave users the ability to see what their friends were saying to others during private chats Read More

Hacker develops multi-platform rootkit for ATMs
One year after his Black Hat talk on Automated Teller Machine security vulnerabilities was yanked by his employer, security researcher Barnaby Jack plans to deliver the talk and disclose a new ATM rootkit at the computer security conference. Read More

Real security breaches take time
In the movies, security breaches are binary affairs. One second the attacker is faced with insurmountable NSA grade encryption, the next they have complete control of everything. Of course, in real life, security breaches are much more boring. A real-life security breach, whether by an external attacker or a disgruntled insider unfolds gradually, over weeks, months or even years. Read More

IPv6 tunnel basics
More Internet traffic is expected to be carried via tunnels as the Internet infrastructure migrates from IPv4, the current version of the Internet protocol, to the long-anticipated upgrade known as IPv6. Read More


WHITE PAPER: BeyondTrust

BeyondTrust 2009 Microsoft Vulnerability Analysis
The results show that despite unpredictable and evolving attacks companies can greatly reduce risk, experience greater protection from zero-day threats and reduce the threat from vulnerabilities by removing administrator rights. Learn More

Report blames IT staff for school Webcam 'spying' mess
The IT department of the Pennsylvania school district accused of spying on students using their school-issued laptops took the brunt of the blame in an independent report released Monday. Read More

IT risk assessment frameworks: real-world experience
Formal risk assessment methodologies try to take guesswork out of evaluating IT risks. Here is real-world feedback on four such frameworks: OCTAVE, FAIR, NIST RMF, and TARA. Read More

Symantec Embraces Encryption with New Acquisitions
Symantec announced two new acquisitions--PGP Corporation for approximately $300 million, and GuardianEdge Technologies for around $70 million. Purchasing these two established encryption providers will enable Symantec to take a more comprehensive approach to protecting data. Read More

Study: Cost of data breach in U.S. is highest world wide
A global study of data breach costs conducted by the Ponemon Institute finds notification laws have dramatic impact on the price tag Read More

From Microsoft to Adobe insecurity: One man's journey
Marc Maiffret spent the earlier part of his career shedding light on major Microsoft vulnerabilities. In his new gig, names have changed but not the threats. Read More

The evil men (can) do with embedded systems
Embedded IT infrastructure is everywhere and full of holes evil-doers can use for world domination. How SecurityFAIL.com could stem the tide. Read More


WHITE PAPER: Oracle

Business Agility Strategies For Midsize Organizations
Midsize businesses have enormous IT pressures: building an infrastructure that is flexible, designed to accommodate rapid growth and meets compliance challenges with resources nowhere near larger enterprises. This video whitepaper explains how Oracle is delivering applications specifically for midsize businesses. Learn More

Federated identity project on the horizon
From time to time in this newsletter we take a look back 10 years to see what we were talking about "back in the day." The newsletter was called "Focus on Directory Services" back then. But going back even further, before there were Network World newsletters, directory services often featured prominently in my Wired Windows column. One idea that was near and dear to my heart was the concept of "federated directories." Read More

Verizon and Novell team up on cloud security
Verizon and Novell have teamed up to deliver a cloud-based security solution Read More

Security firm reveals Microsoft's 'silent' patches
Microsoft silently patched three vulnerabilities last month, two of them affecting enterprise mission-critical Exchange mail servers, without noting the bugs publicly, a security expert said today. Read More

New Facebook Social Features Secretly Add Apps to Profile
When a piece of software is automatically installed on your computer without your knowledge, it's called malware. But what do you call it when Facebook apps are added to your profile without your knowledge? We discovered Wednesday that this is actually happening, and stopping it isn't as easy as checking a box in your privacy settings. Read More

Michael Dell calls for cybersecurity rethink
Cybersecurity needs a global rethink, and fast, Dell's CEO Michael Dell and Services CTO, Jim Stikeleather, have warned experts at the EastWest Institute Worldwide Cybersecurity Summit in the US. Read More

Microsoft goes small for next week's Patch Tuesday
Microsoft today said it would patch two critical vulnerabilities with two updates to Windows and Office next week. Read More

Fast-spreading P2P worm targets USB drives
A crafty new P2P worm appears to be spreading quickly among users of a range of popular file-sharing programs. Read More

U.S. Treasury Web sites hacked, serving malware
Three Web sites belonging to the U.S. Department of the Treasury have been hacked to attack visitors with malicious software, security vendor AVG says. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

15 copies of CCNP ROUTE study kits available and 15 copies of Unix and Linux System Administration Handbook up for grabs, too.Deadline May 31.

SLIDESHOWS

Geeky Weddings, Birthdays, and Funerals
If you've ever dreamed of marrying a video-game character, having your ashes put in a computer, or holding your wedding on the deck of Star Trek's USS Enterprise, you're not alone.

2010 'Geek and Tech' Summer Movie Preview
It's summer movie time again, time for the movie studios to trot out its blockbusters with explosions and all sorts of fun. Here's our picks for the favorite movies that techies and geeks (comic book fans, unite!) will be lining up for.

MOST-READ STORIES

  1. Wi-Fi key-cracking kits sold in China mean free Internet
  2. Is the Android truly open source?
  3. Hacker develops multi-platform rootkit for ATMs
  4. 10 hot energy projects that could electrify the world
  5. Oral Roberts banishes Cisco
  6. FCC to claim some broadband regulatory power
  7. Microsoft woos developers with latest IE9 preview
  8. Ellen: "The people at Apple didn't think it was so funny"
  9. Indie developers create 'choose your own price' game bundle
  10. IE9 sure is faster, but users have mixed reactions

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment