Friday, September 21, 2012

2012 Ig Nobel Prizes honor real, but offbeat research

  The 10 most common mobile security problems and how you can fight them | What to learn from the $10 million Subway POS hack
 
  Network World Compliance

Forward this to a Friend >>>


2012 Ig Nobel Prizes honor real, but offbeat research
Groundbreaking research into monkey butts, green hair, diamonds and dead fish was honored this year. Read More


RESOURCE COMPLIMENTS OF: Google

Google Apps for Business
Do more for less with your team using Google Apps. Custom web-based email, calendars, and documents to easily share & work together in the cloud. Start with a free 30-day trial!

WHITE PAPER: SafeNet Inc

Securing Sensitive Data in Virtual and Cloud Environments
This paper reveals how SafeNet ProtectV delivers critical capabilities that combine encryption, access policies, key management, content security, and authentication to help security teams effectively meet governance, compliance, and data protection mandates. Learn More

The 10 most common mobile security problems and how you can fight them
When it comes to security, most mobile devices are a target waiting to be attacked. That's pretty much the conclusion of a report to Congress on the status of the security of mobile devices this week by watchdogs at the Government Accountability Office. Read More

What to learn from the $10 million Subway POS hack
Two Romanian hackers will serve time for targeting Subway in a $10 million point-of-sale conspiracy involving 150 restaurants in 2011. Read More

RSA looks to have SIEM do advanced real-time threat analysis, forensics
RSA is readying a product it calls Security Analytics whose purpose is basically to transform the company's traditional security information and event management (SIEM) product, EnVision, into a hunter of stealthy attackers, and a forensics tool to analyze attacks. Read More

Security startup isolates untrusted content in virtual machines
Security-software startup Bromium is shipping its first product, a virtualization client that runs any untrusted content inside its very own virtual machine -- a microVM -- protecting the underlying operating system and whatever content is stored on the physical machine from theft and malware infection. Read More


WHITE PAPER: SafeNet Inc

Compliance Assurance for Virtual and Cloud Environments
When implementing virtual or cloud-based services, organizations that need to ensure ongoing compliance must address several key requirements before they can migrate sensitive data. ProtectV is designed to provide data protection and auditable compliance for all mandated regulations. Learn More

Vendors cautiously optimistic over Google buying VirusTotal
Google expected to improve quality and power of the small company's tools, but sharing of virus samples across vendors a concern Read More

Sophos admits bad update slamming its anti-virus software customers
Security firm Sophos today apologized for wreaking havoc in its customers' networks after a faulty update to its anti-virus software yesterday caused false positives for certain malware to occur on Windows-based computers. Read More

Mobile malware shifting to SMS fraud
Apps secretly bill victims for premium text services Read More

Senator takes cybersecurity law fight to CEOs
Sen. Jay Rockefeller (D-WVa.) hopes cybersecurity legislation can be revived in Congress by avoiding "the filter of beltway lobbyists," and connecting directly with top business leaders. But critic say he could have done so long ago. Read More


WEBCAST: Webroot Software

Try the fastest business security ever.
Online security is an increasing risk for businesses, but what is the best solution? Cloud-based SaaS security is an emerging trend for organizations looking to address today's security reality. Learn about the cloud-based SaaS security. Learn More.

Anonymous spokesman's YouTube meltdown led to arrest
If anybody was surprised at the arrest in Dallas last week of Barrett Brown, self-described sometime spokesman for the hacktivist group Anonymous, it should not have been Brown himself. Read More

Cybercriminals shift focus to bank employees
The evolution of cybercrime continues: The preferred target in the financial industry is moving from the bank customer to the employee. Read More

Indonesia advances world's most ambitious biometric-based national identity card project
Tampa -- You might not guess that Indonesia, a large country that's basically an archipelago of over 70,000 islands that has infrastructure issues in electricity and limited bandwidth, is the nation rolling out the world's most ambitious biometrics-based national identity card project for its citizens. But it is. Read More

5 win government grants to help 'get rid of passwords'
A federal initiative called the "National Strategy for Trusted Identities in Cyberspace" has been encouraging the high-tech industry to work with government to find alternatives to simple passwords in order to foster more secure online transactions. The NSTIC program has been promising to fund $10 million in government grants for pilot projects to showcase innovative approaches, and today the winners were finally announced. Read More

 
 
 

SLIDESHOWS

TEST: 6 free email servers for small businesses
hMailServer (Windows only) wins our test; Citadel (Linux only) comes in a close second

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Apple iOS 6 review: A worthwhile upgrade
  2. Cisco's exit from ADCs should come as no surprise
  3. The 10 most common mobile security problems and how you can fight them
  4. iOS 6 arrives: Its 16 key new features
  5. Cisco looks to one-up Arista, Juniper with Nexus 3548
  6. Kaspersky researcher cracks Flame malware password
  7. iPhone 5 rave reviews rollup: "lust", "it floats" and "love at first swipe"
  8. 5 enterprise alternatives to Dropbox
  9. Apple, Amazon lead brave new world of online maps -- but why now?
  10. Hackers exploit 0-day: Kick IE to the curb or catch a nasty Poison Ivy itch?
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

1 comment:

  1. My ex ruined my credit due to his incessant extravagant spending spree, I found myself in a big mess. I talked to a credit repair company and I was told that it would take me non less than a year to fix my credit. I was devastated, that's a very long time which I can't cope with. I looked online and came across Credit Doctor's contact, hit him up and to my greatest surprise, my credit was repaired in 4 working days from 486 -810. I was so amazed and it didn't cost me too much really. I implore you to contact him on for all credit issues and hacking issues. No doubt that he's the best out there and your problems will be solved!
    HACKINTECHNOLOGY@GMAIL.COM
    +16692252253

    ReplyDelete