Friday, October 15, 2010

A quarter of WiFi networks unsecured; When IT is asked to spy

When IT is asked to spy | IBM buys e-discovery vendor PSS

Network World Compliance

Forward this to a Friend >>>


A quarter of WiFi networks unsecured, finds survey
Years after WiFi security was supposed to have gone 'critical', a quarter of access points in the UK remain open and unsecured, a new 'wardriving' survey has discovered. Read More


WHITE PAPER: NetApp

Storage for Windows Environments
This paper discusses how consolidating your Microsoft SQL Server, Exchange, and SharePoint Server data along with your Windows files using NetApp storage for Windows environments reduces the cost of physical storage as well as ongoing management costs in Windows environments. Read More!

In this Issue


WHITE PAPER: APC by Schneider Electric

Estimating a Data Center's Electrical Carbon Footprint
Data center owners will be increasingly challenged to report their carbon emissions. This paper introduces a simple approach, supported by free web-based tools, for estimating the carbon footprint of a data center anywhere in the world. Read Now.

When IT is asked to spy
It's 9:00 in the morning, or 3:00 in the afternoon, or even 10:00 at night. Do you know what your users are up to? More than ever, IT managers can answer, "Oh, yes." Read More

IBM buys e-discovery vendor PSS
IBM said Wednesday it is purchasing e-discovery vendor PSS Systems, in a move that further broadens Big Blue's sprawling portfolio of information management software. Terms were not disclosed. Read More

Trojan Forces Firefox to Save Your Passwords
A Firefox Trojan has been found to force the Internet browser to save user passwords and then use those passwords to create a new user account on the infected computer. Read More

Akamai unveils payment card tokenization service
New service from Akamai Technologies hides sensitive payment-card information using a scrambling method known as tokenization in order to reduce liability under the Payment Card Industry (PCI) data security standards. Read More

Encryption for the Internet and for telephony
In 1991, Zimmerman released Pretty Good Privacy (PGP) and made it available, including source code, by FTP, thus allowing virtually anyone with an Internet connection to download it. At that time, PGP (based on the RSA algorithm) was the first freely available public-key based encryption program. Read More

Focus on ZeuS Malware Clears the Way for Other Threats
The ZeuS "crimeware toolkit" has made recent headlines lately by garnering attention of the FBI, and for the new components that allow hackers to break into BlackBerry and Symbian phones. Read More

Microsoft will look to courts for botnet takedowns
Microsoft has seen a dramatic drop in the number of computers infected with Waledac, a piece of malicious software affiliated with a botnet that was once responsible for a massive amount of spam. Read More

Cisco's top 10 rivals
Competition is only getting tougher for Cisco as it continues to expand in 30 or so new markets while attempting to maintain growth in its core routing and switching businesses. Read More


WHITE PAPER: Socialtext

Web-Oriented Architecture is Changing Enterprise IT
Companies want to surface key events from traditional systems of record inside social applications where employees can collaborate and take action to improve core business processes. This paper discusses the trend and requirements necessary to build an enterprise architecture to perform the integration. Read now!

AVG Internet Security 2011
AVG Internet Security 2011, which shipped on Tuesday, offers the full complement of tools you'd expect in an all-in-one security suite, packaged in a simple-to-use interface and offering integration with popular browsers and Outlook. But the software is marred by annoying attempts to upsell you to other products, and a scanning engine that may slow down your system. Read More

Security chief warns of global cyberthreat
Once hailed as an economic saviour, the Internet is now in danger of becoming a threat to the future prosperity of the UK and its allies, the head of UK security agency GCHQ Iain Lobban has said in a rare speech. Read More

Facebook Tightens Security with One-Time Passwords
By its very nature as a social network, Facebook is a veritable gold mine for cyber criminals. Recognizing the threat of account hijacking and compromise, Facebook has implemented new security features to protect Facebook accounts, including a one-time password via mobile phone text message. Read More

Many businesses not PCI compliant at time of data breaches
Companies can dramatically cut their risks of data breaches by complying with payment standards, according to a new report. Read More

Think Your Twitter DM Is Private? Think Again
Twitter has established itself as a means of broadcasting information to wide group of people all at once. But, for those times where you want to talk more intimately, Twitter also has the ability to send a Direct Message (DM) that is private between the two parties. Well, it's supposed to be private, but the reality is perhaps not as secretive as one might expect. Read More

Surprise! Passwords Still A Weak Link in Security Chain
Despite predictions that the password will fade into obscurity, or the rise of alternative methods of authentication such as fingerprint scanners, the username and password are still the default method of accessing secure accounts and information. Unfortunately, weak passwords, and poor password practices mean the password isn't providing very good protection in many cases. Read More

RSA: Businesses need 'air traffic control' style security
Businesses need air traffic control style security to protect their myriad systems in operation and meet regulatory demands, according to RSA Security president Art Coviello. Read More

Zeus not the only bank Trojan threat, users warned
Online bank account users should not ignore the threat posed by obscure data-theft Trojans such as 'Bugat', 'SpyEye', and 'Carberp', security company Trusteer has warned. Read More


WHITE PAPER: F5 Networks

Connecting to the Cloud with F5 and VMware VMotion
Migrating applications, storage and VMs to the cloud is no small task. Learn how a new technology can: • Move live services without interruption • Enable VM migration across the WAN between clouds and data centers • Work without a re-architecture of local or remote networks Learn More!

: McAfee bolsters endpoint security, mgmt software
McAfee endpoint security supports Windows and Apple Macintosh as well as Android-based handhelds and the iPhone, Symbian and Windows Mobile smartphones. Read More

Lie your way to password security
My friend Martin Kuppinger (of the Kuppinger-Cole analyst firm) recently blogged about "security questions." You know, those things you're asked in order to prove that you're you whenever you forget your password (or, in my case, simply get fumble-fingered and mistype it). Read More

Video surveillance as a service: VSaaS dos and don'ts
Video Surveillance as a Service (VSaaS)--another name for hosted or managed video services--may help streamline your operations. But as with any service or product, you have to choose the right match for your specific needs. Here are critical considerations from the front lines. Read More

Six enterprise security leaks you should plug now
The Titanic was thought to be unsinkable, a testament to the engineering prowess of its day and the fact that luxury liners rarely collided with massive icebergs. Read More

As plans for NAC deployment get under way, keep it simple
I've mentioned network access control several times in this column over the past few months. If you've been following along, you know that I like the functionality it offers but am leery of the difficulty and cost of deploying it, as well as the resources required to manage it properly. Read More

Record Patch Tuesday Hits Older Software Hardest
Today is Microsoft's monthly Patch Tuesday, and as predicted October sets a new record for security bulletins in a single month. More than ever, IT admins need to understand the risks and prioritize the various patches to effectively manage the deluge of updates, and protect vulnerable systems as efficiently as possible. This month also demonstrates yet again that legacy software is inherently less secure. Read More

School district settles webcam spying suit for $610,000
A suburban Pennsylvania school district accused of spying on students by using school-issued laptops has agreed to pay $610,000 to settle litigation stemming from its controversial practice. Read More

Researchers: Criminals could launch 'social reality' attack
Malware could soon become sophisticated enough to launch social engineering attacks based on analysis of a victim's behavioural patterns and social interactions, researchers have suggested. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Goodies from the Subnets
We've got 15 copies of books up for grabs: Cisco Nexus Switching and Microsoft SQL Server 2008 R2 Unleashed. Enter to win one!

SLIDESHOWS

Ig Nobel honors world's wackiest researchers: 2010 winners
The 20th annual Ig Nobel Prizes were awarded Thursday night for "achievements that first make people laugh, and then make them think." The prizes commemorate the world's funniest research, and sometimes the world's biggest villains (BP is a winner this year). Here's a list of the 2010 prizes.

Eight hot commercial space projects
The recently passed NASA Authorization Act of 2010 was generally seen as a huge nod toward developing commercial space projects. NASA Administrator Charles Bolden said the authorization "launches a commercial space transportation industry." Indeed there are a number of interesting commercial space projects underway.

MOST-READ STORIES

  1. iPhone 4 to hit Verizon in early 2011
  2. Microsoft releases biggest-ever security update
  3. Cisco still haunted by 3-year-old Brazil case
  4. Data brokers digging up and selling your digital dirt
  5. Microsoft Wiffler lets smartphones use free Wi-Fi from moving vehicles
  6. Beefy Alcatel-Lucent switch targets Cisco, Juniper
  7. Seven secret weapons for network management on a budget
  8. To thwart keyloggers, Facebook introduces one-time passwords
  9. Microsoft: New virtualization software will boost Windows 7 upgrades
  10. Gain administrator access without a password

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment