Friday, June 17, 2011

Smartphones and tablets create huge corporate security challenge

10 iPhone passcodes to pass on | The Funniest Sites on the Web

Network World Compliance

Forward this to a Friend >>>


Smartphones and tablets create huge corporate security challenge
Adapting security and management for the new generation of mobile devices -- everything from the Apple iPhone and iPad to Google Android devices to name a few -- is turning out to be a huge corporate challenge. Read More


WHITE PAPER: Extreme Networks

Networks in Motion
Download this whitepaper today and discover how you can cost-effectively optimize your network for the mobile demands of today's business. Examine how IT can provide: * Personalization and intelligence. * Ease of operation. * Seamless quality of user experience. * Secure on-the-go access to public and private networks. Read now!

In this Issue


WEBCAST: Cymphonix

Gain Complete Control Over Internet Bound Traffic
The Cymphonix Network Composer is the only network appliance that provides comprehensive clarity into all internet bound network traffic and simply powerful tools to manage that traffic with a holistic approach. Learn More Today!

10 iPhone passcodes to pass on
Attention iPhone users: You're not fooling anyone if you're using 1234, 0000, 2580, 1111, 5555, 5683, 0852, 2222, 1212, 1998 as your smartphone passcode. Read More

The Funniest Sites on the Web
Online privacy is dead. Our data may be in jeopardy. Haters, hackers, and trolls abound. Advertising and porn have taken over. But on the other hand, there's still a lot of funny on the Web Read More

Want to stop cybercrime? Follow the money
At Usenix, a cybersecurity researcher explains how the key to stopping computer criminals is in the economics of cybercrime. Read More

Citigroup reveals breach affected over 360,000 cards
Over 360,083 credit card accounts in North America of Citigroup were affected as a result of a compromise of its card account management website in May, the bank said in an update on Wednesday. Read More

Cisco backs embattled RSA SecurID in new security architecture
With all of the recent security problems around RSA's SecurID two-factor authentication technology as a backdrop, Cisco today made it clear that it's still a major supporter of SecurID by including the two-factor authentication token as a main security component in what Cisco calls its "PCI 2.0 Architecture" of assembled Cisco, EMC, RSA, VMware and HyTrust products. Read More


WHITE PAPER: Raritan

Data Center Transformations
Build outs, consolidations and acquisitions are large-scale projects that can be very disruptive and require careful planning and implementation to maintain operations. This white paper examines the process and what's required to meet IT goals and objectives and maintain business continuity. Read now!

When LulzSec attacks: A survivor's story
Security start-up Unveillance fell prey to LulzSec. In this interview, founder Karim Hijazi talks about how the hack unfolded and what lessons he sees for companies. Read More

Firms target mobile security hole with antiphishing browser
Lookout joins other security firms, releasing a browser for smartphones that can blacklist known phishing sites. Read More

Virtualized environments painfully insecure?
John Burke of Nemertes Research says while organizations are hot for virtualization technology, they are ignoring security in the rush to adopt Read More

Microsoft rings alarm bell on fake Windows support calls
Microsoft today warned that scammers have taken to the phone lines to dupe Windows users into putting malware on their machines or paying for worthless help. Read More

EU ministers seek to ban creation of 'hacking tools'
Justice Ministers across Europe want to make the creation of hacking "tools" a criminal offence, but critics have hit back at the plans saying that they are unworkable. Read More


WHITE PAPER: Microsoft

Easing Pressures on the Energy Industry
Pressures on delays, efficiency and safety, push operation managers to optimize the major processes of energy plants. See how industry-leading modeling and visualization software, coupled with sophisticated analysis, provides a complete solution for nuclear power plants, hydro power plants, oil & gas facilities and wind farms. Read More

Court says Comerica Bank must pay after customer is hacked
A Michigan court has ruled that Comerica Bank is liable for a US$560,000 cyberheist, saying the bank should have done a better job to spot millions of dollars in fraudulent transactions after one of the bank's customers was tricked in a phishing attack two years ago. Read More

Hospital turns to palm reading to ID patients
NYU's Langone Medical Center is the first hospital in the Northeast to use a new infrared palm-scanning technology that ensures patients are linked to their medical records and helps prevent medical ID theft. Read More

LulzSec attacks gaming sites ... just for laughs
The hacking group known as LulzSec called it Titanic Takeover Tuesday. Gamers called it by a variety of names, many of which cannot be reprinted here. But for system administrators at a handful of gaming companies, Tuesday, June 14 was a nightmare: the day their websites went down under an online attack. Read More

Why CIOs Should Care About Privacy
Customers will judge your company's competence according to how well you protect their data, says Don Peppers, co-founder of customer relationship advisory firm Peppers & Rogers Group. CIOs are on the front line. Read More

Get your money for nothing, get your certs for free
A new SSL certificate authority squeezes so much overhead out of supplying certs that it plans to give them away starting next month and to continue at least through the end of the year. Read More

Spear phishers sharpen skills, craft 'incredible' attacks, say experts
Recent break-ins at high-profile targets like the International Monetary Fund (IMF) demonstrate just how proficient hackers have become at 'spear phishing,' researchers said today. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Microsoft Subnet: A set of classes for a Microsoft Cert from Webucator and Polycom videoconferencing system. Enter here.

SLIDESHOWS

10 SaaS companies to watch
These days, companies are applying the software-as-a-service (SaaS) model to just about everything, from core business functions, including IT, to industry-specific processes. This list, compiled with the help of SaaS trend watchers and users, provides a representative look at what types of software you'll find offered in the cloud.

MOST-READ STORIES

  1. FBI dumpster diving brigade coming to a trash can near you
  2. Chrome nearly replaced Firefox in Ubuntu Linux
  3. 10 iPhone passcodes to pass on
  4. EU ministers seek to ban creation of 'hacking tools'
  5. Want to stop cybercrime? Follow the money
  6. Ubuntu breaks from the Linux pack
  7. Cisco distracted by reorg
  8. Cisco backs embattled RSA SecurID
  9. Gartner: IT should be planning, moving to private clouds
  10. Cisco fabric launch seeks to undermine Arista, IBM

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment