Search This Blog

Wednesday, February 27, 2013

FTC: Identity theft retains its throne as No.1 worst scourge in Top 10 consumer complaint list

  Hospital unresponsive to multiple alerts about stolen data | Security firm Trustwave targeted by phishing campaign
 
  Network World Security

Forward this to a Friend >>>


FTC: Identity theft retains its throne as No.1 worst scourge in Top 10 consumer complaint list
Identity theft has been the top consumer complaint to the Federal Trade Commission now for 13 years running. Read More


WHITE PAPER: IBM Corporation

Microsoft Dynamics AX solutions from IBM
IBM provides consulting, implementation and application management services for Microsoft Dynamics AX, a comprehensive ERP solution for midsize and larger organizations that empowers people to work effectively, manage change, and compete globally. Learn More.

WHITE PAPER: Moovweb

3 Steps to a Cost-Effective Mobile Strategy
In the new Moovweb white paper, "Creating the Right Mobile Strategy: What You Need to Know Before You Get Started", get the insight you need to make an educated decision on the move to mobile. Read Now!

Hospital unresponsive to multiple alerts about stolen data
Security experts trying to tell a rural hospital that a pile of its sensitive data belonging to staff and possibly patients sits exposed on the Internet have been stymied for five days now by the fact that no one at the medical facility will respond to their repeated warnings. Moreover, says one of the experts, this kind of situation happens with alarming regularity. Read More

Security firm Trustwave targeted by phishing campaign
Customers of security firm Trustwave are being targeted by a phishing campaign that masquerades as a PCI DSS compliance scan, the company has warned. Read More

10 tech company social media bloopers
Read More


WHITE PAPER: F5 Networks

Solving Substantiation with SAML
Read this paper to learn how F5 uses SAML to effectively enable secure web domains to exchange user authentication and authorization data, providing users of web browsers with single sign-on (SSO) convenience they need. Learn More!

McAfee acquires ValidEdge sandboxing technology
McAfee yesterday said it has acquired the ValidEdge anti-malware sandboxing technology from LynuxWorks in order to add a new type of malware detection to its network and endpoint products. The first integration of sandboxing into its product line is expected in the second half of this year. Read More

When did you learn how to code?
"I think everybody in this country should learn how to program a computer - because it teaches you how to think." --Steve Jobs Read More

INSIDER
NBA Team Rebounds From IT Disaster
After Katrina, the New Orleans Hornets built a stronger disaster-recovery operation: a hot site with a diesel engine big enough to 'power a locomotive.' Read More


WHITE PAPER: Kaspersky Lab, Inc.

Security for Virtualization
The view of leading analysts is that in the rush to implement virtualization, security has become a poor second. So while the business benefits are clear, the risks are less well documented and understood. This makes selecting the right virtual-aware anti-malware solution even more important. Learn more.

Windows XP and Firefox browser amass worst vulnerability record over past 25 years
In a look at the number of vulnerabilities recorded over 25 years in software products and open source, a researcher at Sourcefire has determined that Microsoft Windows XP and the Mozilla Firefox browser stand out as the two with the largest number of high-severity vulnerabilities. Read More

New Box security features aimed at user, device and content protection
Box is rolling out several new security features aimed at making its 150,000 business customers feel more confident in its cloud storage and file sharing service. Read More

RSA 2013: Weatherford outlines 'cyber 9-1-1' plan
Mark Weatherford, deputy undersecretary for cybersecurity at DHS, wants to set up a cyber 9-1-1 system for critical infrastructure. He outlined his vision today at the Cloud Security Alliance Summit, held as part of the RSA Conference. Read More

Start-up tracks risky security behavior in the cloud
Start-up Skyhigh Networks today introduced a service aimed at tracking risk associated with enterprise use of about 2,000 cloud services, in order to spot any rogue cloud services or to identify high-risk exposure that cloud use might bring to the enterprise. Read More

Researcher unearths two new Java zero-day bugs
A Polish security firm known for rooting out Java vulnerabilities has reported two new bugs in the browser plug-in to Oracle, Security Explorations said today. Read More

 
 
 

SLIDESHOWS

10 tech company social media bloopers

Social media blunders are nothing new, and the technology industry is not immune to them.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. West Virginia auditor blasts Cisco, state for 'oversized' router buy

2. 14 dirty IT tricks, security pros edition

3. Hottest products at RSA Conference 2013

4. Microsoft admits to being hacked too

5. Hottest products at Mobile World Congress 2013

6. iPhone 6 rumor rollup for the week ending Feb. 22

7. If Apple had unveiled Google Glasses ...

8. Cisco virtual router targets the cloud

9. Samsung finally makes Galaxy S IV official

10. Why Android 4.2.2 is an important update

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: