Search This Blog

Wednesday, October 21, 2009

FTC slams MoneyGram with $18M charge to settle fraud complaints

Security software protects mobile and remote Mac, Windows users; US high-tech trade deficit improves, still long way to go
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by Qualys
rule

Vulnerability Management Checklist
Discover the 12 key decision points you need to consider when choosing a vulnerability management solution. This checklist walks you step-by-step through critical questions to ensure you select the solution that will best protect your network and data.

Learn more now.

rule

Spotlight Story
FTC slams MoneyGram with $18M charge to settle fraud complaints

This place sounds like scam central. The second-largest money transfer service in the United States, MoneyGram International today agreed to pay $18 million in consumer redress to settle FTC charges that the company allowed its money transfer system to be used by fraudulent telemarketers to bilk U.S. consumers out of tens of millions of dollars. Read full story

Related News:

Security software protects mobile and remote Mac, Windows users
DeepNines Technologies Tuesday is unveiling a desktop security agent that works in tandem with its content-filtering and anti-malware gateway to protect mobile and remote workers.

US high-tech trade deficit improves, still long way to go
It might not be time to break out the bubbly just yet but US high-tech exports totaled $223 billion in 2008, up one percent from $220 billion in 2007 continuing a trend that has seen tech exports rise 38% since 2002. The number represents the single largest export sector in the country, accounting for 17% of the total US exports.

Survey: Americans don't trust the cloud to store confidential data
Americans don't trust cloud storage for their confidential data, with identity theft ranking as their top security concern.

Symantec: Rogue Security Software is Big Business for Crooks
The bogus ads are everywhere. A pop-up tells you: "Your computer may be infected" and urges you to download security software that will scan your computer for viruses, protect it from future infection or both. The problem is most of these products are scams that give you software which is useless. In some cases, the software is even dangerous because it downloads malicious code onto your computer.

Baited and duped on Facebook
When CIO Will Weider encouraged employees at Ministry Health Care and Affinity Health System in Wisconsin to use Facebook to spread the word about new programs and successful projects, he was surprised at the result: Few did so.

Microsoft Subnet is giving away training from Global Knowledge and 15 copies of Microsoft Expression Web 3 In Depth. Cisco Subnet is giving away training from Global Knowledge and 15 copies of Building Service-Aware Networks. Google Subnet is hosting many new bloggers. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


Cell towers in disguise
Cell towersSome of the cell towers that dwell among us are cleverly hidden; others, not so much.

The ultimate smartphone
SmartphonesWhat if you could combine the best parts of every phone out there?

Identity Management E Guide
Identity management cannot be ignored – it is the key to preventing data breaches. This Network World Executive Guide provides in-depth information on today's most pressing security issues.
Read More


5-Steps For Lowering Mobile Employee TCO
The rise of employee-owned BlackBerry, iPhone and other smartphones has created significant IT management and compliance challenges. This report recommends a 5-Step Mobility Management approach used by IT execs at best-in-class companies to cut mobility TCO, reduce risk and increase productivity.
Learn more.

 

October 21, 2009

MOST-READ STORIES

  1. Verizon fires shots across iPhone's bow with Droid smartphone
  2. Smartphone smackdown: Motorola Droid vs. iPhone 3GS
  3. What the heck are you doing on the Internet at that hour?
  4. Ballmer: Sidekick outage 'not good'
  5. Secrets of successful data centers
  6. 10 things you need to know about Windows 7
  7. Ethernet everywhere!
  8. Hoax of the day: U.S. Chamber backs "strong" climate bill (not)
  9. Mozilla blocks Microsoft's sneaky Firefox plug-in
  10. Symantec calls 'SpywareGuard', 'Antivirus' top scareware threats

IBM ISS X-Force Threat and Risk Report
Read this Trend and Risk report from IBM® ISS X-Force® to learn statistical information about all aspects of threats that affect Internet security, including software vulnerabilities and public exploitation, malware, spam, phishing, web-based threats, and general cyber criminal activity.
Download this report today!



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments: