Tuesday, 5 April 2011

Best Buy customers part of Epsilon breach

Backup Disasters: How You Can Avoid Them | EMC/RSA acquires electronic threat detection firm NetWitness

Network World Security

Forward this to a Friend >>>


Best Buy customers part of Epsilon breach
Retailer Best Buy today told customers that files containing the "'email addresses of some Best Buy customers were accessed without authorization" due to a data breach at marketing firm Epsilon. Read More


WEBCAST: Dell

Security: A Multilayered Approach
The resources in this Security KnowledgeVault provide expert advice on everything from creating a multilayered security strategy and deploying a more proactive fight against cybercrime, to realizing when it's time to stop going it alone and seek outside, expert help. Learn more.

WHITE PAPER: Dell

Elements of a Proactive Data Security Solution
See all the survey results along with more data security resources, including an expert Webcast outlining six vital security steps, in the security KnowledgeVault. Learn more.

Backup Disasters: How You Can Avoid Them
Even those of you religious about backing up your PC data may face a few of the same demons that CIO.com's Bill Snyder recently battled. Read on for advice on how to make sure your backups don't behave badly. Read More

EMC/RSA acquires electronic threat detection firm NetWitness
EMC Corp. today announced it has acquired NetWitness Corp., security company that makes the NextGen visibility monitoring system to detect electronic threats and malware-based attacks. EMC said NetWitness will operate as part of RSA. Read More


WHITE PAPER: Zetta

The Urgency of Recovery and Restore
Data protection is challenging, but the true test is at recovery and restore. Problems may arise from not having data protection versioning or not enough RPO granularity to significant data protection errors and no automated way to catch them. This independent white paper will help you take the pain out of data protection, recovery and restore. Read More >>

Hacked: Xbox LIVE Banhammer Stepto Gets Jacked
What happens after being banned 35 times from Xbox LIVE? Well in one case of "payback" this weekend, a hacker social engineered his way into taking over the Xbox LIVE account and the website of Stephen "Stepto" Toulouse, the top cop and ultimate banhammer for Xbox LIVE. According to RipTen, Stepto "doesn't have as much control and power over the infamous ban-hammer as he would like." Read More

RSA Reveals More Details About Its Security Breach
On Friday, RSA Security held an analyst conference to provide more details on the recent security breach and subsequent investigation. RSA provided a bit more detail on the "Advanced Persistent Threat" (APT), the actual root cause of the security breach. Apparently, cyber criminals did a lot of intelligence gathering on specific RSA employees. Read More


WEBCAST: IBM

Malware is Everywhere
Get up to speed on the proliferation of security issues and hear about new techniques that combine IBM Rational AppScan and Internet Security Systems (ISS) technologies to scan and identify unwanted, embedded malware. View Now

Expect targeted attacks after massive Epsilon email breach, say experts
Security experts today warned users to watch for targeted email attacks after a breach at a major marketing firm that may have put millions of addresses in the hands of hackers and scammers. Read More

Attacks on the foundation of our industry
In the two weeks since my last column, the security industry has been rocked by several extremely serious attacks against some of our fundamental pillars of trust: two-factor authentication (RSA SecurID) and SSL certificates (Comodo).  Read More

Grand jury investigation targets smartphone privacy
Pandora and possibly other makers of popular smartphone applications are being questioned by a federal grand jury about their privacy practices. Read More

Bank of America to further ramp up security with new CISO
Bank of America has hired a new CISO as it continues its effort to bolster security after WikiLeaks claimed to have obtained sensitive internal documents from an unnamed major U.S. bank. Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a Windows 7 Enterprise Technician class for three people. From Cisco Subnet: 15 copies of VMware ESXi books. Enter here.

SLIDESHOWS

Tech's youngest billionaires
The nine youngest billionaires in technology run the gamut from a social networking entrepreneur to the creator of the online coupon company, groupon.com. Think you know them all? Let's find out.

No joy for would-be baby shakers and drunk drivers
In this slideshow we'll take a look at some of the most notorious applications that were banned or removed from the big-name app stores.

MOST-READ STORIES

  1. Ridiculous DHS list: You might be a domestic terrorist if ...
  2. Bank customers warned after breach at Epsilon marketing firm
  3. FBI wants public help solving encrypted notes
  4. RSA hackers exploited Flash zero-day bug
  5. Robots dive deep underwater to solve airliner crash mystery
  6. Samsung installs keylogger on its laptop computers
  7. 35 years of 'Apple' Fools Day fun
  8. iPhone 5 won't be in attendance at WWDC 2011
  9. Thieves are stealing children's identities
  10. Cisco fleshes out its data center switch fabric story

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as lisab509.pcnews@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment