Thursday, 7 April 2011

Victoria's Secret no longer, Epsilon breach sees to that

'We regret to inform you': The Epsilon breach letters you don't want to see | Do utility companies slight IT security?

Network World Security

Forward this to a Friend >>>


Victoria's Secret no longer, Epsilon breach sees to that
Lingerie vendor extraordinaire Victoria's Secret today had to notify its clientele it had became just another Epsilon breach victim as customers got this nasty little email: Dear Valued Customer, Your privacy is extremely important to us, and we wanted to share the following information with you. We discovered that an unauthorized party has gained access to files containing email addresses associated... Read More


WEBCAST: Dell

Security: A Multilayered Approach
The resources in this Security KnowledgeVault provide expert advice on everything from creating a multilayered security strategy and deploying a more proactive fight against cybercrime, to realizing when it's time to stop going it alone and seek outside, expert help. Learn more.

WHITE PAPER: Dell

Shelter from the Storm: Data Security for SMBs
Small and midsize businesses must deploy cost-effective strategies to improve security and minimize the impact of data breaches. The resources in this Data Security KnowledgeVault will help guide you through six vital steps to get out of reactive mode and build a foundation for a multilayered approach to data security. Learn more.

'We regret to inform you': The Epsilon breach letters you don't want to see
"We regret to inform you ..." are five words you never want to see in an email. But over the weekend thousands of people did as Epsilon began warning its customers that it had suffered a break-in and email addresses were stolen. Read More

Do utility companies slight IT security?
Do utilities and energy companies spend huge amounts for physical security but slight information-technology security? Read More

Senators: E-surveillance law needs to be updated
Democratic senators call for changes to a 25-year-old e-surveillance law. Read More


WHITE PAPER: Sophos

Malicious JavaScript Attacks: What Can You Do?
As an IT manager, you need to be able to effectively secure all of the websites you manage to avoid attack and the subsequent infection of site visitors. You also need to protect the users within your organization from becoming victims of malware. We'll review what to watch for, as well as the security strategies that will help keep you safe. Read more

SSDs reign at Storage Networking World
Avere Systems and Marvell kicked off Storage Networking World in Santa Clara, Calif., this week with announcements of new products that use DRAM storage Read More

Sony's 'in for a hell of a wake-up call,' Anonymous says
Anonymous is at it again, this time attacking Sony and its playstation.com site for gamers, promising to publish personal details about Sony executives online and to unleash a triple wave of botnets against company sites. Read More

Gucci admin accused of $200,000 IT rampage
A network engineer fired by fashion house Gucci has been charged with going on an IT rampage against his former employer in which he deleted data, shut down servers and left the company nursing an estimated $200,000 cleanup bill. Read More


WHITE PAPER: Dell

Defending the Assault on Your Data
Learn how turning to outside help, specifically designed for small and midsized businesses, can affordably provide the protection you need. It's just one of the resources, along with expert Webcasts and IDG security survey results, you'll find in this data security KnowledgeVault. Learn more.

RSA detailing SecurID hack to customers sworn to secrecy
RSA has started providing more detail into the mid-March attack on its SecurID token-based authentication system, but to get a fuller story you have to be an RSA customer willing to sign a nondisclosure agreement (NDA). Read More

Japan Disaster Places Focus On Resiliency
The March 11 earthquake and tsunami hitting Japan highlights colocation and wireless as part of enterprise disaster-recovery strategy planning. The challenge in wide-reaching disasters like earthquakes, tsunamis and hurricanes is that the backup facility (in-house or colocation) may, too, be in the disaster zone, while wired communications are typically damaged, making recovery difficult. Read More

Verizon simulates disaster near operations center
It was only a drill, but Verizon Communications' emergency response team brought in its serious equipment for a hazardous materials test in Cockeysville, Maryland, Monday and Tuesday. Read More

FAQ: Epsilon email breach
A server breach at Epsilon Interactive exposed the names and email addresses of millions of people. This explainer tells what happened and how you can protect yourself. Read More

Tax prep maker warns customers of Epsilon email hack impact
Intuit has warned users of its tax preparation software to be aware of identity theft scams in the wake of a major breach at marketing firm Epsilon. Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a Windows 7 Enterprise Technician class for three people. From Cisco Subnet: 15 copies of VMware ESXi books. Enter here.

SLIDESHOWS

Get a net-workout with cloud-enabled gym gear
Can your treadmill do this? Core Performance embeds fitness smarts in software that runs on custom exercise equipment and also powers online fitness applications. The exercise gear is connected to the Internet and taps cloud-based data such as workout goals, health history and nutrition habits to create personalized exercise plans and track how you're doing in the gym.

Cisco has revamped its E-series routers with a sleek new design and prices to meet every budget. The company revealed a total of seven new products, four routers, three switches, some of which replace earlier E-series versions.

MOST-READ STORIES

  1. Bashing Microsoft 'like kicking a puppy,' says Linux Foundation chief
  2. 'We regret to inform you': The Epsilon letters you don't want to see
  3. Wozniak questions long-accepted date of 'Day One' at Apple
  4. Microsoft: Happy 36th birthday!
  5. Cisco Linksys gear targets boom in home use of 802.11n wireless nets
  6. Apology to Samsung: We blew it
  7. 11 geekiest musical artists of all time
  8. Would you take a pay cut to telecommute?
  9. RSA detailing SecurID hack to customers sworn to secrecy
  10. Ridiculous DHS list: You might be a domestic terrorist if ...

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as lisab509.pcnews@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment