Friday, January 14, 2011

Top 10 Tech Scares of the Decade; Kama Sutra malware threatens to put Windows users in awkward position

Top 10 Tech Scares of the Decade | NSA breaks ground on Utah 'spy center' data center

Network World Compliance

Forward this to a Friend >>>


Kama Sutra malware threatens to put Windows users in awkward position
A Sophos IT security consultant has issued a warning not to fall prey to malware that uses a PowerPoint presentation demonstrating sexual positions from the Kama Sutra as its lure. Read More


WEBCAST: Oracle

Lower Costs with Oracle Database 11g
Faced with static or shrinking budgets, IT organizations need to lower costs throughout the data center, while their business users demand a high quality of service – consistently fast response times, 24x7 availability, and comprehensive security. Register now!

In this Issue


WHITE PAPER: Siemens

Finding the Value in Unified Communications
This paper examines the four stages of return companies can see from their UC investments: Lower communications costs are followed by lower operational costs, then better productivity, and finally a true competitive advantage. Read More

Top 10 Tech Scares of the Decade
The dawn of the new millennium prompted fears about the future, but so far reality has not quite matched the predictions of catastrophe. The first ten years passed uneventfully--well, aside from Y2K and a bunch of intelligent computer viruses. Here's a look back at the past decade, and ten of the most terrifying tech scares. Read More

NSA breaks ground on Utah 'spy center' data center
The National Security Agency is building one of the largest and most expensive data centers as a place to gather and analyze intelligence data. Read More

UConn reports data breach of online retail site
An online retail site at University of Connecticut is warning thousands of customers that their billing information may have been hacked. Read More

Survey on PCI: How it's impacting network security
A survey of 500 information technology professionals with responsibility to assure compliance with the Payment Card Industry (PCI) security standard shows just over half find it "burdensome but necessary" in their organizations and about a third see it impacting their virtualized network environments in particular in the future. Read More

Cloud Security Alliance plans RSA summit
CSA will provide updates on progress in several research areas, including security-as-a-service, incident response and its Governance, Risk Management & Compliance (GRC) stack. Read More

Study: Network IPS security improving
An independent IT security research and testing lab found that while there has been significant improvement in intrusion prevention system performance and security, a wide range of capabilities means shoppers must carefully review system capabilities. Read More

Protecting Data on Portable Drives
It is almost mind-boggling how much data can be stored on a portable drive or USB thumb drive. As convenient as it is it to be able to carry 1TB of data in your pocket, though, portable drives are also easily lost or stolen, and gallivanting about can take its toll on the data. It is important to protect the portable drives and the data they contain. Read More


WEBCAST: Aruba Networks

Medical Center Shares Tips on Wi-Fi Application Assurance
In this 15-min webinar, Rutland Regional discusses how they deliver reliable voice, video and medical device communications at the point of care. WLAN at Rutland was once a nice to have serving a select group & has now transitioned to what is deemed a utility serving a diverse group of users. Learn more now!

Former TSA contractor gets two years for damaging data
A former U.S. Transportation Security Administration contractor will serve two years in prison for messing with sensitive government databases used to identify terrorists as they try to enter the U.S. Read More

'Patriot Act' phishing e-mails resurface, FDIC warns
Scammers are trying to steal banking information using fake e-mails that look like they've come from the U.S. Federal Deposit Insurance Corporation, the FDIC warned Wednesday. Read More

Google pays record bounty for Chrome bug
Google Thursday said it patched 16 bugs in the Chrome browser, including one tagged as critical that brought its founder a record $3,133 bounty. Read More

Fraud incident reports down, says report
A quarterly measure of fraud reporting among employees finds violations have dropped Read More

Sony asks for restraining order over PS3 hack
Sony Computer Entertainment has launched legal action against five hackers who recently released a set of tools that allows illegally copied games to run on the PlayStation 3 game console. Read More

Hoax smartphone apps: a security headache in 2011
Hoax smartphone apps that masquerade as a game or app but actually steal personal information from the handset such as passwords and logins will be one of four internet scams causing problems for Brits in 2011, says Knowthenet.org.uk. Read More

RIM Warns of BlackBerry Browser, BES Vulnerabilities
BlackBerry-maker Research In Motion (RIM) yesterday issued two separate security advisories warning both BlackBerry smartphone users and corporate BlackBerry Enterprise Server (BES) administrators of newly discovered security flaws in many versions of RIM's BlackBerry handheld software and in BES. Read More


WHITE PAPER: Quest Software

Choosing the Right Active Directory Bridge Solution for You
The importance of a solid Active Directory (AD) bridge in your diverse IT environment can't be minimized. An AD bridge allows Unix, Linux and Mac systems to coexist with a Windows infrastructure. Further, it consolidates countless identities and passwords, reducing complexity and cost while improving security and productivity. Read Now

SAP buying security software, other assets from SECUDE
SAP is acquiring software and related assets from its partner SECUDE in order to provide improved security for its customer base, the company said Wednesday. The deal is expected to be completed by Feb. 1. Terms were not disclosed. Read More

Cloud Computing Used to Hack Wireless Passwords
German security researcher Thomas Roth has found an innovative use for cloud computing: cracking wireless networks that rely on pre-shared key passphrases, such as those found in homes and smaller businesses. Read More

Sophos: Android a big target of Facebook-based attacks
Sophos Senior Technology Consultant Graham Cluley agrees with a BitDefender study showing Facebook as a growing attack vector for smartphone malware. Sophos has seen a similar pattern, and Android phones are often the easiest targets, Cluley said in a sit-down interview Tuesday. Read More

Author warns of Russia's and China's 'Spinternet'
Is the Internet, with its blogs, tweets, e-mail, Web and social networking sites, a force to change places such as Iran, China, Vietnam and Russia into Western-style democracies with the West's ideas about freedom of expression and political rights? Read More

Microsoft patches critical Windows drive-by bug
Microsoft today patched three vulnerabilities in Windows, one that could be exploited by attackers who dupe users into visiting a malicious Web site. Read More

WikiLeaks fiasco prompts new Fed effort to boost data security
The White House has called on all government to review processes in place to identify workers who may be inclined to disclose classified data to whistleblowers like the WikiLeaks Web site. Read More

Mac App Store Pirate Raid Raises Security Concerns
Less than 24 hours after Apple launched the Mac App Store, hackers have found a simple way to pirate applications from the store. Applications from the Mac App Store that skimp on DRM features can be easily validated as genuine with a few clicks when they are downloaded from third-party websites. But security firm Sophos says the exploit not only leads to piracy, but also to malware. Read More



BECOME AN INSIDER
Get premium content, in-depth reviews, practical tips and exclusive research. All for just signing up. Sign up for free today.

SLIDESHOWS

12 geekiest snow and ice sculptures
Not all tech weenies hunker down indoors when the snow starts piling up and the ice coats the streets. Some put on their mittens and boots and go to work creating fantastic snow and ice sculptures celebrating their tech favorites.

2011's 25 Geekiest 25th Anniversaries
Our fifth annual collection of the year's "geekiest anniversaries" kicks off with The Mentor's "Hacker's Manifesto" and includes such memorable characters as Captain Midnight and Ferris Bueller, institutions the likes of the IETF and Spy magazine, and inventions like the Super Soaker and disposable camera.

MOST-READ STORIES

  1. Microsoft guy slams "President of the United States of Google"
  2. Facebook, Google, Yahoo commit to 'World IPv6 Day' trial
  3. Will Apple remove home button from next-gen iPad, iPhone?
  4. 2011's 25 geekiest 25th anniversaries
  5. Facebook wants to issue your Internet driver's license
  6. Kama Sutra malware may put Windows users in awkward position
  7. Palin e-mail snoop imprisoned, despite judge's recommendation
  8. Apple is professional Linux
  9. Sony shutting plant that used to make 18M CDs a month
  10. Google pays record bounty for Chrome bug

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: