Friday, December 17, 2010

CIO gets 6 years for embezzlement scheme; OpenBSD back door claim now in doubt

OpenBSD back door claim now in doubt | 7 reasons security pros fail

Network World Compliance

Forward this to a Friend >>>


CIO gets six years for embezzlement scheme
The former chief information officer at a large U.S. automobile processing company has been sentenced to nearly six years in prison for embezzling more than $500,000 from the company by faking expense reports and reselling company equipment. Read More


WHITE PAPER: Emerson Network Power

Improving Availability in a Digital Hospital
Downtime is not an option for healthcare IT systems. To ensure patient data is always available at the point of care, the hospital's network closet IT infrastructure must be properly designed. Learn the essential points for evaluating the benefits and costs associated with powering and cooling a hospital's network closets. Read Now

In this Issue


WEBCAST: Iron Mountain

Online Server Backup Checklist
Small businesses are quickly adopting the cloud as an alternative way to back up their critical data. If you haven't yet made the move to the cloud, attend this webcast to explore what to look for in an online backup solution to save you time, money and free up your precious IT resources. Learn more!

OpenBSD back door claim now in doubt
The claim that the FBI planted a backdoor in OpenBSD a decade ago has been flatly denied by developer protagonists named as having been involved in the conspiracy in an email sent to OpenBSD founder, Theo de Raadt. Read More

7 reasons security pros fail
Read More

Tech news quiz 2010
Naked spies, CEO scandals and billion-dollar deals made 2010 a year to remember Read More

11 techie and yummy gingerbread creations
Mostly edible iPhones, motherboards, laptops and of course, Google Android "Gingerbread" treats. Read More

2010's most popular iPad apps
What people bought during the iPad's inaugural year Read More

Norton Utilities adds defragmenter tool, other features
Symantec's Norton unit today announced an updated version of its Norton Utilities software, adding a way to defragment and organize files and data that's become scattered across a hard drive, enabling quicker startup, file access and more free disk space. Read More


WHITE PAPER: Brocade Communications Inc.

Cloud –Inspired Data Center Transformation
In these articles, Network World and its sister publications CIO and Computerworld present the latest thinking and explore the latest trends on how data centers are evolving toward the cloud ideal. Read now!

Five cloud security trends experts see for 2011
What do IT security practitioners expect to be major cloud security issues in 2011? Here are five things to watch for. Read More

WikiLeaks and Cyber Security
How could this have happened and what does it say about cyber security vulnerabilities?There's been a lot written about WikiLeaks over the past few weeks -- some of it fair and some a bit off base. No question that there was a security breach related to classified documents ending up on WikiLeaks but it is important to dig a bit further to define what may have gone wrong. Here are the elements of security involved and where a breakdown may have occurred: Read More

Best and worst celebrity technology moments of 2010
Lindsay Lohan, Lady Gaga and Stephen Colbert collide with Twitter, iPads and hackers. Read More

LOIC tool enables 'easy' WikiLeaks-driven DDoS attacks
As the tools employed within the pro-Wikileaks distributed denial-of-service attacks highlight, attack software is getting insanely simple to deploy and use. Read More

McDonald's Customer Data Compromised through Contractor
McDonald's is warning customers to be on guard against identity theft, phishing attacks, or other scams thanks to a data breach. What makes the data compromise more concerning is that it is indicative of a growing hacker strategy to go for the low-hanging fruit rather than staging a direct attack. Read More

Zeus botnet targets holiday shoppers
Man-in-the-middle attack uses social engineering to get Macy's, Nordstrom account holders to reveal sensitive information Read More


WEBCAST: Dell

Webcast: Is Virtualization Right for SMBs?
You've heard that large companies embrace virtualization to consolidate their data centers, reduce costs, and improve operating efficiency and IT service levels. However, your data center only has tens of servers, not hundreds or thousands. Should you consider virtualization as well? View this webcast to learn more. Register now!

Is Jailbreaking a Device Becoming Acceptable?
A little mentioned fact about the new Google CR-48 notebook is that it's designed to be jailbroken. This was announced by Sundar Pichai, during Google Chrome's recent preview presentation. There's a switch on the inside of the battery compartment that slips the unit into developer mode. Read More

Core expands into network vulnerability testing
The latest version of Core Impact can now scan network devices for security vulnerabilities Read More

The WikiLeaks drama: A timeline
Feeling lost somewhere in the middle of the WikiLeaks drama? Here's a timeline to help you sort things out. Read More

US Dept. of Commerce: New online privacy rules needed
The U.S. Department of Commerce recommends a new privacy bill of rights and an enforceable privacy code of conduct for online firms. Read More

Will feds mandate Internet routing security?
The U.S. Department of Homeland Security has spent $3 million over the past few years on research aimed at bolstering the security of the Internet's routing system. Read More

More censorship, data breaches and devices: Security predictions for 2011
This past year has been a doozy in the security world. We kicked off the year by discovering operation Aurora, saw the first national-industrial sabotage attack with Stuxnet and are closing the year with Wikileaks about to become a constitutional crisis between the First amendment and a 1917 espionage law. Reality has well and truly become weirder than fiction. Read More

Policy, education key to reining in rogue cloud
It used to be that rogue access points and USB drives kept IT administrators up at night, worrying about employees exporting sensitive corporate data. Now, with good reason, they're worrying about employees using cloud services in ways that could compromise corporate data. Read More

Internet hit by wave of fake PC 'defrag' tools
A spate of scareware apps that trick users into buying useless hard disk repair tools appears to be part of a concerted campaign to push fake 'defrag' software, a security company has said. Read More



FILL OUT A SURVEY, GET REWARDED
Get a free Starbucks gift card for participating in a Network World survey about application performance management best practices. Research firm NetForecast is surveying enterprises about APM practices for an upcoming Network World article. The first 100 participants will receive a $5 Starbucks gift card. Click here.

DECEMBER GOODIES FROM THE SUBNETS
SharePoint 2010 power user training for three people from Webucator, plus a brand new iPad available from Microsoft Subnet. Five massive libraries on CCNP, security, NX-OS up for grabs on Cisco Subnet. Enter to win!

SLIDESHOWS

Best and worst celebrity technology moments of 2010
Here's a look back at the year's most memorable – for better or worse – celebrity moments in technology.

Top 15 Holiday Deals on Notebooks, Netbooks, and Desktops
Black Friday is gone, Cyber Monday is history, and Cyber Week is over, but the deals are still around--if you know where to look. The holiday shopping season is in full swing, and retailers are offering great computer discounts to fit everyone's budget. Take a look inside to find netbooks for $300, desktops with widescreen monitors for under $600, and 15-inch laptops starting at $400. Check it out.

MOST-READ STORIES

  1. Hackers get Ubuntu Linux booting alongside Chrome OS
  2. Google launches new 'Body Browser'
  3. Dropbox updated to 1.0, brings selective sync to masses
  4. Analyst expects Apple to sell up to 20 million iPhones on Verizon
  5. Apple updates AirPort Utility, base station firmware
  6. Tablet wars of 2011: The battle looms
  7. Is iOS jailbreaking an enterprise security threat?
  8. Hacker tool Metasploit now targeting Cisco network gear
  9. Microsoft teams with Apple, Oracle, EMC on 882 Novell patents
  10. Brief Facebook outage causes slight panic

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment