Friday, December 14, 2012

Worst security snafus of 2012

  Nationwide/Allied security breach highlights litigation fears | Hacktivism gets attention, but not much long-term change
 
  Network World Compliance

Forward this to a Friend >>>


Worst security snafus of 2012
The first half of 2012 was pretty bad -- from the embarrassing hack of a conversation between the FBI and Scotland Yard to a plethora of data breaches -- and the second half wasn't much better, with events including Symantec's antivirus update mess and periodic attacks from hactivists at Anonymous. Read More


RESOURCE COMPLIMENTS OF: AT&T

Are you ready for cloud services?
If you're thinking about cloud services for your organization, ask yourself this question: Are you ready? According to Forrester Research, Inc., that's the most important thing to consider before moving forward with your cloud initiatives. That's why we'd like to offer you a complimentary copy of the Forrester report: Assess Your Cloud Maturity. Get the report now to start planning your cloud services strategy.

RESOURCE COMPLIMENTS OF: Google

Google Apps for Business
Do more for less with your team using Google Apps. Custom web-based email, calendars, and documents to easily share & work together in the cloud. Start with a free 30-day trial!

Nationwide/Allied security breach highlights litigation fears
An insurance company data breach that exposed 1.1 million people to identity fraud exemplifies the kind of cybercrime that companies increasingly fear will land them in civil court. Read More

Hacktivism gets attention, but not much long-term change
Latest break-in at International Atomic Energy Agency highlights that the public still doesn't buy criminal acts in support of 'good causes' Read More

Apple hires former Microsoft hacker to work on Mac OS X security
Apple has quietly hired Kristin Paget, a former Microsoft security expert who worked as a hacker for the company to resolve Windows Vista vulnerabilities, to work on its Mac OS X security team. Read More

Are BYOD Employees Decommissioning Mobile Devices Properly?
Sales of mobile devices are expected to surge this holiday season. Whether your firm has embraced bring-your-own-device (BYOD) or elected to look the other way that means many of your employees can be expected to upgrade their tablets and smartphones. But what about their old devices? Will they be decommissioned properly? Read More


WHITE PAPER: HP & Intel® Xeon® Processors

Top 10 Benefits of Virtualization
In this eGuide, Network World sister publications InfoWorld, and PC World examine some of the current uses of blade servers in today's data center, as well as how trends such as server virtualization are reshaping enterprise computing. Read Now!

Holiday lights go techie
It's not just throw out a bunch of lights and watch them shine in the nighttime. You've got to set them to music... all with the help of technology. Check out just a few. Read More

The 3 biggest threats to your cloud data
Any horror movie fan can tell you the scariest threats are the ones you don't see coming, and the same is true when it comes to threats to cloud data. IT has decades of experience protecting on-premise resources. Virtually no one has even one decade of experience running major SaaS applications, so we should be prepared for some surprises. Read More

Microsoft: Most PCs running pirated Windows in China have security issues
Microsoft has launched a new anti-piracy campaign in China, which intends to highlight the security risks of buying counterfeit software. Read More

Ghostshell takes credit for extensive hack of government, private websites
The hacktivist group Team Ghostshell took credit Monday for the release of 1.6 million accounts and records stolen from government and private organizations covering aerospace, law enforcement, the military, the defense industry and banking. Read More


WHITE PAPER: Ixia Anue

The Evolving Visibility Challenge
Network monitoring has become more complex over the last few years, due in large part to virtualization and convergence. Learn how a state-of-the-art monitoring system that maximizes your existing monitoring tool investment can help you attain greater visibility into your network without adding complexity. Say goodbye to virtual blind spots. Learn More

Cisco aims for bigger services business, more software revenue
Cisco Systems plans to expand its services business over the next several years, seeing a more important role for itself in a world of connected machines and devices. Read More

IE exploit can track mouse cursor - even when you're not in IE
A vulnerability affecting Internet Explorer versions 6 through 10 could make it possible for a hacker to monitor the movements of your mouse, even if the browser window is minimized. Read More

Oracle rolls out new database security package
Oracle is simplifying its security offerings by combining a pair of existing tools into a single package. Read More

Ransom hackers encrypt medical centre's entire database
An Australian medical centre is reportedly considering paying a ransom demand of $4,000 AUD (APS2,600) after blackmailers broke into the organisation's servers and encrypted its entire patient database. Read More

 
 
 

SLIDESHOWS

Top network and IT industry stories of 2012
The cloud, tablets, software-defined networking, IPv6 and 4G wireless reshape the enterprise IT landscape in 2012.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. 13 events that defined Cisco's 2012
  2. Who makes the most popular anti-virus in the world? Microsoft (yeah, that's right)
  3. Juniper buys SDN startup for $176 million
  4. The weirdest, wackiest and coolest sci/tech stories of 2012
  5. Young people bedding their smartphones: Cisco study
  6. Fave-reads: 5 must-read books for IT career growth
  7. Riverbed announces three releases for the Steelhead Mobile Controller appliance
  8. Microsoft: What it did right and wrong in 2012
  9. IE exploit can track mouse cursor - even when you're not in IE
  10. Dexter malware infects point-of-sale systems worldwide, researchers say
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment