Wednesday, 6 April 2011

'We regret to inform you': The Epsilon breach letters you don't want to see

Attackers favor social-networking sites, shortened URLs | What NetWitness brings to the RSA table

Network World Security

Forward this to a Friend >>>


'We regret to inform you': The Epsilon breach letters you don't want to see
"We regret to inform you ..." are five words you never want to see in an email. But over the weekend thousands of people did as Epsilon began warning its customers that it had suffered a break-in and email addresses were stolen. Epsilon now says that about 50 of its client businesses were hit -- no small number as Epsilon blasts some 40 billion messages in their names each year. Read More


WEBCAST: Dell

Security: A Multilayered Approach
The resources in this Security KnowledgeVault provide expert advice on everything from creating a multilayered security strategy and deploying a more proactive fight against cybercrime, to realizing when it's time to stop going it alone and seek outside, expert help. Learn more.

WHITE PAPER: Dell

Guidelines for Choosing a QSA
The independent white paper in this security KnowledgeVault is just one of the resources to help you make the right decision. It details the top 5 questions to ask a prospective QSA firm and offers guidelines on everything from making sure they adequately handle compensating controls to assessing their expertise with virtualization. Learn more.

Attackers favor social-networking sites, shortened URLs
Social-networking sites and shortened URLs have become the favored technologies for scam artists to lure victims to websites that attempt to push malware or launch an attack, says a Symantec report released today. Read More

What NetWitness brings to the RSA table
Josh Corman of The 451 Group says EMC's acquisition of NetWitness will benefit RSA customers greatly. Read More


WHITE PAPER: Radware

New Threats Require Real-Time Protection
This white paper discusses some of the new intrusion prevention technologies that repeal the most emerging threats to organizations today and in the future. Read Now

Cisco Linksys gear targets boom in home use of 802.11n wireless nets
Cisco Tuesday announced a slew of routers and switches designed to address the explosion of home networked devices, from smartphones to table computers to Internet-enabled TVs. Read More

Got gold? You might wish you did at record $1,452.50 p/ounce
The cost of gold is skyrocketing, with the price today closing at $1,452.50 an ounce on the Comex division of the New York Mercantile Exchange. With that crazy number, which experts say is a result of US government shut-down uncertainty and the war in Libya, comes the scammers of course, and an uptick in thefts of the prized metal. More on hot metal: AT&T goes after copper wire thieves Read More


WHITE PAPER: Sophos

Why Hackers have turned to Malicious JavaScript Attacks
Reaching unsuspecting users through the web is easy and effective and hackers now use sophisticated techniques—like injecting inline JavaScript—to spread malware. Learn more about this threat, how it works and how cybercriminals make money with these types of attacks. Read now.

Vatican publication rehabilitates hackers
Internet hackers have acquired a dubious reputation for piracy, sabotage and the spilling of sensitive secrets, but an authoritative Vatican publication appears to rehabilitate them and traces parallels between hacker philosophy and the teachings of Christianity. Read More

Games on company gear? Depends who you ask
Only about a third of more than a thousand respondents to a Network World online survey believe it's always wrong to use company equipment to host private video game sessions for groups of players. Read More

Privacy group demands tougher protections from FTC
The Electronic Privacy Information Center (EPIC) has practically accused the FTC of being derelict in its duties to protect Internet user's privacy. This attitude is revealed among the public comments filed in response to the FTC's proposed Policy Framework on privacy. Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a Windows 7 Enterprise Technician class for three people. From Cisco Subnet: 15 copies of VMware ESXi books. Enter here.

SLIDESHOWS

Get a net-workout with cloud-enabled gym gear
Can your treadmill do this? Core Performance embeds fitness smarts in software that runs on custom exercise equipment and also powers online fitness applications. The exercise gear is connected to the Internet and taps cloud-based data such as workout goals, health history and nutrition habits to create personalized exercise plans and track how you're doing in the gym.

Cisco has revamped its E-series routers with a sleek new design and prices to meet every budget. The company revealed a total of seven new products, four routers, three switches, some of which replace earlier E-series versions.

MOST-READ STORIES

  1. Wozniak: Tablet is the PC for 'normal people'
  2. 2. Ridiculous DHS list: You might be a domestic terrorist if ...
  3. ISO finalizes C++ update
  4. Hacked: Xbox Live Banhammer Stepto gets jacked
  5. Windows 8 rumor mill heats up as Microsoft eyes tablet market
  6. 6. FBI wants public help solving encrypted notes
  7. Apology to Samsung: We blew it
  8. 8. Cisco fleshes out its data center switch fabric story
  9. Microsoft: Happy 36th birthday!
  10. Public cloud vs. private cloud: Why not both?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as lisab509.pcnews@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment