Search This Blog

Thursday, September 27, 2007

Fraud police buckling under mountains of data; TJX offer no good for 99% of breach sufferers

Network World

Security News Alert




Network World's Security News Alert, 09/27/07

Fraud police buckling under mountains of data, 09/26/07: Fraud investigators are struggling to cope with vast quantities of data sent to them by financial institutions, meaning some crimes may go uninvestigated or even unnoticed, experts said on Wednesday.

TJX credit-monitoring offer no good for 99% of breach sufferers, 09/26/07: TJX customers who lost a whopping 45.2 million credit or debit card numbers will not be offered credit monitoring in the tentative settlement TJX drafted in hopes of smoothing over its data breach controversy.

eBay denies security breach led to posting of user data, 09/26/07: When the names and personal information of 1,200 eBay users, along with credit card numbers, suddenly appeared yesterday on eBay’s Trust & Safety Discussion Board where public comment is shared, eBay responded by immediately shutting down the discussion board.

Straight Talk from Security Experts

Leading security experts share their advice, secrets and real-world experiences in Network World's latest Executive Guide, "The Security Treadmill." Learn how to get inside users' heads, fight for a bigger security budget and much more.

Click here to download this Executive Guide.

Researchers say AIM vulnerable to worm attack, 09/26/07: A critical flaw in the way that the AOL's instant messaging client displays Web-based graphics could be exploited by criminals to create a self-copying worm attack, security researchers are warning.

Trend Micro anti-malware update targets online transactions, 09/26/07: Trend Micro today announced updated consumer desktop anti-malware packages, and released a new product, Internet Security Pro, intended to protect customers engaged in online transactions.

Canadian probe finds TJX breach followed wireless hack, 09/25/07: After months of speculation about how exactly the intrusion at TJX Companies happened, officials now know what happened.

iPhone hacks void warranty, Apple says, 09/25/07: Less than a week after CEO Steve Jobs said that Apple would fight hacks that unlocked the iPhone, the company said any modification, unlocks included, voids the phone's warranty.

iPhone unlock hackers promise to fight Apple updates, 09/25/07: The programmers who wrote free software that unlocks Apple's iPhone Tuesday disputed the company's claim that their hacks can damage the device, and they promised to battle any attempt by Apple to "brick" modified phones.

Blue Lane updates virtual machine protection, 09/26/07: Blue Lane Technologies next week plans to release an updated version of its VirtualShield software product, which provides monitoring, protection and patch-update assistance for VMware’s clustered ESX virtual-machine platform.

Security experts pitch 'culture of data', 09/26/07: The companies that are having the most success in advancing their data security efforts today are those that are finding a way to protect sensitive information without getting in the way of business users, industry experts maintain.

Chat with Amazon.com’s CTO live: If ever there were a man that knew how to eek out capacity and secure a data center, it would be Werner Vogels, vice president & CTO of Amazon.com. Join him for a live chat on Monday Oct. 1 from 2 p.m. - 3 p.m. EDT. No registration is required, but those who RSVP “yes” to community editor Julie Bort in advance will be eligible for a Network World T-shirt.

TODAY'S MOST-READ STORIES:

1. 2007 Salary survey: IT pay falls short
2. A defense against Photoshop fakery
3. Phil the Fish teaches users to spot phish
4. 'Panda virus' victim offers perp plum IT job
5. 7 cool consumer technologies at DEMOfall07
6. AT&T wins $1B Treasury Department deal
7. Cisco broadens Carrier Ethernet line
8. Gartner touts Web 2.0, scoffs at sequel
9. VMware bugs shed light on virtualization security
10. HP's wireless network traffic monitoring

MOST-READ REVIEW:
The best VM management tools to tame the virtual beast


Contact the author:

Senior Editor Ellen Messmer covers security for Network World. E-mail Ellen.



BONUS FEATURE

IT PRODUCT RESEARCH AT YOUR FINGERTIPS

Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details.


PRINT SUBSCRIPTIONS AVAILABLE
You've got the technology snapshot of your choice delivered to your inbox each day. Extend your knowledge with a print subscription to the Network World newsweekly, Apply here today.

International subscribers, click here.


SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription.


Advertising information: Write to Associate Publisher Online Susan Cardoza

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772

Copyright Network World, Inc., 2007

No comments: