Search This Blog

Tuesday, July 27, 2010

Black Hat: Most browsers can be made to give up personal data

IT career site Dice launches network for tech recruiters, job hunters | Bring your own everything

Network World Daily News PM

Forward this to a Friend >>>


Black Hat: Most browsers can be made to give up personal data
All the most commonly used Internet browsers are vulnerable to exploits that can force them to cough up users' personal information that can be used to hack into bank accounts or set them up for other attacks, the Black Hat 2010 conference will be told this week. Read More


WHITE PAPER: Eaton

Powering Through the Economy
This white paper explores five specific steps you can take to power your way through these difficult times. Read More

WHITE PAPER: Cisco

Security in the Cloud
This technology dossier contains four papers that address security considerations in cloud computing. It includes IDG Research results on what IT managers have to say about cloud security, executive viewpoints on blending cloud solutions to optimize security, and a strategy paper that addresses protecting data. Read now!

IT career site Dice launches network for tech recruiters, job hunters
Want to mingle with tech recruiters? Get to know hiring managers in the companies you might be interested in joining? IT job site Dice.com has launched a networking site that connects IT job hunters and tech recruiters on a more personal level than traditional resume-submitting transactions allow. Read More

Bring your own everything
The "bring your own" craze started with instant messaging but certainly didn't end there. Today employees are bringing the rest of their social network tools to work, their own smartphones, their own computers, and now, with the advent of Google Voice, their own phone number and voice mail. Read More

8 geek videos that aren't viral - yet
Videos so infectious they make you itch. Read More


WEBCAST: Accelops

Why Private Clouds May Prevail
Cloud computing's perceived challenges of security, visibility and management may give the upper hand to private clouds. Join Yankee Group for this Webcast that discusses how to ensure you deploy a cloud that meets your organization's security and compliance needs. View Now

All-in-one printer reviews
All-in-one printers – also known as multifunction printers – have wide appeal in small businesses and home offices because they provide a range of related functions in a single device, saving space and cost. They often can print, copy, scan and fax. Here is a collection of recent PCWorld reviews of the best all-in-one printers. Read More

Bug reporting could be a hot topic at Black Hat
How researchers report vulnerabilities -- and how companies react to those reports -- may be one of the briskest topics at this week's Black Hat security conference. Read More

News podcast: Network World 360
All the most commonly used Internet browsers are vulnerable to exploits that can force them to cough up users' personal information that can be used to hack into bank accounts or set them up for other attacks, the Black Hat 2010 conference will be told this week. Also, AT&T is patching software in its network to fix a bug that kept iPhone 4 users from getting the full upstream speed on their handsets. (4:57) Read More


WHITE PAPER: Tripwire

Have You Committed a Security Sin?
Almost every organization that has had a major security breach is guilty of at least one of the 7 deadly sins of network security. Learn what they are in this CSO eGuide that provides tips on keeping the villains out, reveals new mega threats and explains how to avoid pitfalls in log management planning. Read More!

HP unveils prefab data centers
HP says using prefabricated building components can cut the upfront cost of designing and constructing a data center in half while also reducing energy consumption. Read More

Never Mind Legality, iPhone Jailbreaking Voids Your Warranty
The U.S. Copyright Office's ruling making iPhone jailbreaking legal doesn't really matter, as long as the process voids the warranty of your smartphone. Apple reminded customers in a statement to Cult Of Mac that jailbreaking their iPhones voids the device's warranty, which means no free repairs if your phone goes bust because of that. Read More

Search engine optimization techniques for hackers
At DefCon, Barracuda Labs will explain how malware pushers use search engine optimization techniques to push their poison to the top of those Google rankings. Read More

Founder: Black Hat reflects a changing industry
In the 13 years since its inception, Black Hat has emerged as one of the premier conferences in the security industry. Each year, Black Hat attracts thousands of security researchers, security practitioners and government types to its annual events in Las Vegas, Tokyo, Amsterdam and Washington. On the eve of the annual conference in Vegas, Black Hat founder Jeff Moss talks about the show and how it has evolved. Read More

What to watch at Black Hat and Defcon
Trying to predict the big news at this week's Black Hat and Defcon conferences is extremely tricky, if not impossible. Usually the most interesting stories pop up at the very last minute -- hackers tend to hold off on disclosing the really big talks because they don't want jittery lawyers to shut them down. And even when you think you know what's going on, sometimes one of the shows steps forward to take center stage, as Defcon did three years ago when Dateline NBC reporter Michelle Madigan was run out of the conference for trying to secretly film show attendees. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

SLIDESHOWS

Say what?
Earlier this month, Microsoft's chief operating officer made a statement that sent everyone's jaws a-dropping. "It looks like the iPhone 4 might be their Vista, and I'm OK with that," he said during a keynote speech at the company's annual partner conference. It got me thinking about quotes that have and will go down in history from the industry's most famous executives. Can you guess who made the following statements?

15 summer vacation ideas for geeks
From Star Trek and Space Camp to baseball minutiae, vintage video games, anime, pirates, Harry Potter and They Might Be Giants, there's a vacation option for any type of geek this summer.

MOST-READ STORIES

  1. Apple grants ABC access to its secretive "black labs"
  2. WPA2 vulnerability found
  3. Cisco study warns against "FarmVille"
  4. Is Sprint losing its WiMAX/4G gamble?
  5. MIT design could speed up the Internet
  6. Certified lies: Big Brother in your browser
  7. Avaya stares down Microsoft, Cisco
  8. Black Hat too commercial for you?
  9. Mobile deathmatch: Apple iOS 4 vs. Android 2.2
  10. Should you even bother looking at Windows Phone 7?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: