Friday, June 08, 2012

How to determine if your LinkedIn password has been compromised

Hacker v. Hacker: When Egos or Motives Clash, Hackers Attack Each Other | The Cisco security directive

Network World Compliance

Forward this to a Friend >>>


How to determine if your LinkedIn password has been compromised
As reports have swirled throughout the day that approximately 6.5 million LinkedIn passwords have been leaked, security experts have been trying to figure out what happened, as well as checking to see if their own passwords have been compromised. Read More


WHITE PAPER: Quest Software

Want to Make Compliance Easy? Get Proactive!
Is your business reactively implementing compliance? If so, you're wasting time and money and destroying productivity. Get proactive! Read now!

WHITE PAPER: Centage Corporation

Centage/IOMA Budgeting Survey: Benchmarks & Issues
How are other financial professionals dealing with the issues you face? This report offers you an inside peak into what the minds at over 200 financial executives are thinking and doing to impact their own bottom line. Learn more.

Hacker v. Hacker: When Egos or Motives Clash, Hackers Attack Each Other
Read More

INSIDER
The Cisco security directive
Chris Young just celebrated his six-month anniversary as senior vice president of the recently formed Cisco Security Group reporting to Cisco CTO Padmasree Warrior. He brings an interesting perspective to the position, hailing as he does from VMware and RSA. Young was senior vice president and general manager for VMware's end user computing solutions and, prior to that, senior vice president for products at RSA. After hearing Cisco CEO John Chambers proclaim in a recent teleconference that we could expect to see Cisco make big strides in security with Young onboard, Network World Editor in Chief John Dix tracked Young down for his vision and plans. Read More

How security pros are handling data overload
Most struggling to make sense of the security log data, while one third found it hard to distinguish malware from the rest, study finds Read More

Dating site eHarmony confirms password breach
The online dating site eHarmony confirmed late Wednesday that passwords for its members were exposed in a breach, a second major compromise following LinkedIn's password exposure. Read More


WHITE PAPER: Symantec

Small and Medium Business Threat Awareness Report
How aware are small businesses about cyber threats that impact them? Do they consider the right type of defense against hackers? Find out in the Small and Medium Business Threat Awareness Report. Read Now!

Microsoft's reaction to Flame shows seriousness of 'Holy Grail' hack
Microsoft appears to agree with experts that the exploit of its Windows Update system by the Flame cyber espionage malware was a "significant" event in the history of Windows hacking. Read More

Gartner: Cloud-based mobile device management (MDM) getting hot
To place management controls on mobile devices such as tablets and smartphones used in business, the enterprise has showed preference for acquiring mobile device management (MDM) software where server and management console components are kept on premises. But that's changing, as companies are now buying cloud-based MDM, according to Gartner. Read More

Who's hiring data scientists? Facebook, Google, StumbleUpon and more
Groupon, ADP, and PayPal are also among eight examples of companies looking to hire data scientists Read More

IBM attacks app design to bolster mobile security
The place to start to bolster security in mobile applications is in the development stage. Catch and fix vulnerabilities then and the final product will be more difficult for hackers to penetrate. IBM on Tuesday unveiled software specifically tailored for testing Android apps. Read More


WHITE PAPER: Aerohive

The Ultralight Branch
Ultralight branches let the business drive the placement and lifespan of branches while minimizing real estate, infrastructure, operational, and service costs. Read now.

INSIDER
Next-gen firewalls can handle the heat
In Network World's two-part test, reviewers David Newman and Joel Snyder put next-generation firewalls through the ringer. They found that products could forward packets at an impressive clip but throughput dropped with advanced security features were turned on. Read More

Mobilisafe debuts with mobile risk-management software
Start-up Mobilisafe makes its debut Monday with a product intended to help IT managers monitor for risks associated with both employee-owned and corporate-issued mobile devices. Read More

Security Utah CTO Steps Down Following Data Breach
The executive director of Utah's Department of Technology Services has resigned over a data breach that exposed the Social Security numbers and other personal data of around 280,000 Medicaid recipients. Read More

Is the cloud really ready for prime time?
Coupa, a 2006 startup that helps more than 200 customer companies manage purchasing and procurement, doesn't own any IT infrastructure -- it is run completely from the Amazon Web Service cloud. Read More

Google warns users of 'state-sponsored' hacks
Google began warning users today of its Gmail online email services when it suspects they may be targets of "state-sponsored" attacks. Read More



SLIDESHOWS

Why the Internet needs IPv6
Explosive growth of Internet users, devices, apps creates demand for more IP addresses.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Gartner: Top 10 emerging infrastructure trends
  2. How to determine if your LinkedIn password has been compromised
  3. Gartner: Cloud-based mobile device management (MDM) getting hot
  4. Dept. of Homeland Security to focus on cyber workforce development
  5. LinkedIn confirms breach, urges members to change compromised passwords
  6. Retelling a Password Nightmare in the Wake of the LinkedIn Password Leak
  7. The life of a 'booth babe': high heels, long hours and leering visitors
  8. HP's policy on politics: 'Do as we say, not as Meg does'
  9. What to expect in Apple's upcoming Maps app
  10. Many 'name' sites sitting out today's World IPv6 Launch

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment