Search This Blog

Tuesday, September 27, 2011

See you anon: Reflections on online anonymity

EDITOR'S NOTE | US senator wants FTC to put heat on "brazen" OnStar for privacy changes

Network World Security Strategies

Forward this to a Friend >>>


See you anon: Reflections on online anonymity
I've never been much of a fan of anonymity. Long-established research in social psychology pointed out that anonymity increases anti-social behavior. Read More


WHITE PAPER: Sybase

Sybase® IQ Accelerates Advanced Analytics
The market-leading column-based analytics server, Sybase® IQ offers accurate answers, scalability and speed for your advanced analytics environments. No platform is better suited to help your business analyse, compete and deliver above the competition. Read now

WEBCAST: IBM

Trends in Business Analytics
In his presentation "Trends in Business Analytics", Colin White (Founder, BI Research) will explore the impact that trends such as analytic RDBMSes, Hadoop and MapReduce, the NoSQL movement, smarter and real-time analytics, and self-service business intelligence will have on businesses. Read Now

EDITOR'S NOTE
Starting next week, Network World will transition this newsletter to our daily Security Alert. If you would like to change your subscription options, please visit our subscription management center online: http://www.networkworld.com/newsletters/preferences.html Thank you for reading Network World newsletters. Read More

US senator wants FTC to put heat on "brazen" OnStar for privacy changes
US Senator Charles Schumer (D-NY) sent a letter to the Federal Trade Commission to get the agency to investigate recent changes made to navigation and emergency services company OnStar made to its privacy practices. Read More

MySQL.Com Website Hacked
Hackers have hacked the MySQL.com website and injected code that will unknowingly infect visitors with malware according the security firm Armorize. If you are using an older browser version or not kept up with Flash and other upgrades, you could be infected while visiting the site without any pop ups or anything warning you of code being installed on your machine. Read More


WHITE PAPER: Citrix

Research—Accelerate Internet Websites and Applications
Gartner report "How to Accelerate Internet Websites and Applications" is a study of three popular website acceleration techniques: network optimization, front-end optimization and edge caching. Read now

Security roundup: Privacy ground war; malware taunts; Massachusetts data loss stink; is SIEM dead?
Personal privacy or the growing lack thereof was one of the hot security buttons this week. Read More

Top 10 banned books of 2010
The American Library Association this week observing its 13th annual Banned Book Week where it takes a look at censorship and all manner of literary issues. The ALA says the Banned Books list was started in 1982 as a "response to a sudden surge in the number of challenges to books in schools, bookstores and libraries." Read More

Concern over U.S. snoops drives Canadian political party to cloud-based encryption
One of Canada's largest political parties is using cloud-based Salesforce.com in the U.S. to store information about voters and interact with them, but worries that U.S. government snoops could peek at sensitive information under U.S. law prompted the Canadian party to use a strong encryption approach. Read More


WHITE PAPER: Quest Software

New NetVault Backup Licensing Model
Read a report from an industry-leading analyst to see why traditional backup and recovery licensing methods no longer make sense. You'll learn how you can dramatically cut costs with a different strategy that's more intuitive, reasonable, enduring, and flexible. Download the report today. Read Now!

Is Quantum Computing real?
Researchers have been working on quantum systems for more than a decade, in the hopes of developing super-tiny, super-powerful computers. And while there is still plenty of excitement surrounding quantum computing, significant roadblocks are causing some to question whether quantum computing will ever make it out of the lab. Read More

NSA Label-based System Could Secure Big Data
The National Security Agency has submitted Accumulo, its label-based, data-store software, to the Apache Software Foundation so that other parties can further develop the technology for use in secure systems. Read More

5 more dirty tricks: Social engineers' latest pick-up lines
You may now be savvy enough to know that when a friend reaches out on Facebook and says they've been mugged in London and are in desperate need of cash, that it's a scam. But social engineers, the criminals that pull off these kinds of ploys by trying to trick you, are one step ahead. Read More

Defense against dark arts: Multidisciplinary security quiz
1. Barbican Read More

Gang of Zeus-driven bank thieves put out of business
A mid-level organizer of an international online bank-theft ring that relied on the Zeus Trojan faces up to 45 years in prison when he is sentenced Jan. 13 after pleading guilty to conspiracy to commit bank fraud and possession of false IDs. Read More



SLIDESHOWS

Geekiest cupcake designs
From mainstream iPhone and Google icons to geeky Ubuntu and Big Blue logos, cupcake bakers have taken inspiration from technology for their complex fondant-and-frosting structures. Here are some of our photogenic favorites.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center and Microsoft training of the winner's choice from Webucator.. Enter here.Also: Please take our survey on certifications and your career

MOST-READ STORIES

  1. Is quantum computing real?
  2. Software upgrades could produce self-tuning wireless access points
  3. iPhone 5 rumor roll-up for the week ending Sept. 23
  4. iPhone 5 doesn't appear T-Mobile bound
  5. Need switches? Buy now, report says
  6. Splunk explains it all
  7. Cisco 6500 series: Retired veteran or re-discovered super soldier?
  8. Facebook's Timeline will be boon for hackers
  9. vSphere 5 sets the virtualization bar
  10. Cisco, Microsoft cooperation on virtual switching gives customers new option

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_strategies_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: