Search This Blog

Thursday, May 21, 2009

iPhone Security; Identity theft lurks around every one of life's turns

Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by IBM
rule

Dynamic Infrastructure Worldwide Virtual Forum, June 23
The world is rapidly becoming more intelligent, more instrumented and more interconnected. It's becoming smarter. To accommodate this fundamental change, your infrastructure must become more dynamic. Attend the interactive general sessions of your choice, visit product exhibits, get your questions answered and round out your experience by joining the live chat with experts. Register for this Event Now

rule

Spotlight Story
iPhone Security, Part 2

M. E. Kabay By M. E. Kabay
Steinberger: Based on my personal observation and analysis, the main security constraints imposed by the iPhone Operating System are as follows. Read full story

Related News:

Identity theft lurks around every one of life's turns
Two reports today via the DataLossDB newsletter demonstrate again that there is a seemingly limitless variety of ways in which your personal information can fall into the wrong hands. Say you lose your job, for example. Already a kick in the backside, it's made even more egregious if you live in New Jersey and the state Department of Labor and Workforce Development "misdirects" your social security number in an envelope-stuffing snafu.

Video focuses on victims of e-mail scam
A documentary-style video, "HCommerce: The Business of Hacking You," puts the focus on the travails of the Spears family of Portland, Ore., which lost about $400,000 when Janella Spears fell for a complex e-mail scam. The video, sponsored by McAfee and posted at www.stopHcommerce.com, includes commentary from an array of observers and characters, including JOHnnyhax and the now graying phone phreak of the 1970s, Cap'n Crunch. But the film is at its best when it focuses on the victims of cybercrime, in this case the Spears family, which fell for an e-mail scam promising the lost fortune of a dead relative, J.B. Spears, in Africa.

Free tools help protect users from IIS zero-day exploit
Security and patch management vendor Shavlik Technologies Tuesday recommended a pair of free tools from Microsoft to help users protect themselves from a zero-day exploit in Internet Information Server. Eric Schultze, CTO of Shavlik, says the IIS Lockdown Tool and the URLScan Tool, both available for free from Microsoft, will provide protection for users until Microsoft decides if it will release a formal patch. 

CA unveils Compliance Manager for z/OS for mainframe policy control
:CA Wednesday unveiled Compliance Manager for z/OS, software that works in tandem with any of three mainframe access-control products -- CA's Access Control Facility or Top Secret plus IBM's Resource Control Access Control Facility -- to boost real-time monitoring and policy control on data.


Evolution of Ethernet
Evolution of Ethernet From 3Mbps over shared coax to 40/100Gbps over fiber…and beyond.

Apple iPhoneys: The 4G edition
Apple iPhoneys: The 4G editioniPhone enthusiasts from around the Web offer their visions for the next-gen iPhone.

Sponsored by IBM
rule

Dynamic Infrastructure Worldwide Virtual Forum, June 23
The world is rapidly becoming more intelligent, more instrumented and more interconnected. It's becoming smarter. To accommodate this fundamental change, your infrastructure must become more dynamic. Attend the interactive general sessions of your choice, visit product exhibits, get your questions answered and round out your experience by joining the live chat with experts. Register for this Event Now

rule

EMA: Refining privilege access security.
Close the security gaps in high-privilege access control and authentication by selecting the right security products for the job. This whitepaper, "Resolving the Privilege Management Paradox," details how. EMA outlines how to find products that offer strong shared access management, better control and clear visibility and multifactor authentication.
Click to download.


DNS news and tips
DNS is not secure and is extremely vulnerable. DNS is at the core of every connection we make on the Internet. While some servers are indeed vulnerable, because of inadequate management or knowledge, the real threat is from the protocol itself and how data is easily subverted or faked as it moves around the internet.
Receive the latest DNS news and tips

 

05/21/09

Today's most-read stories:

  1. Web attack that poisons Google results gets worse
  2. New DNS bug and fix announced
  3. Inside the bad-ass world of military research projects
  4. Cisco unveils a grab bag of wireless LAN products
  5. NDC: Cloud computing
  6. Slideshow: Products to be shown at Interop
  7. Free tools help protect users from IIS zero-day exploit
  8. Sprint CEO preaches patience at JP Morgan tech conference
  9. HP claims Cisco 'alternative' mantle
  10. Nortel continues the enterprise fight


Network World on Twitter: Get our tweets and stay plugged in to networking news


Metzler: 2009 Handbook of Application Delivery
Successful IT organizations must know how to make the right application delivery decisions in these tough economic times. This handbook authored by WAN expert Jim Metzler will help guide you.
Download now



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: