Wednesday, 11 May 2011

Mobile computing brings out the organized, international and profit-driven cybercriminal

Senator: Google, Apple sending mixed signals on tracking | Most companies skimp on third-party code checks, study finds

Network World Security

Forward this to a Friend >>>


Mobile computing brings out the organized, international and profit-driven cybercriminal
The mobile computing technology explosion has brought out seriously organized, international, and profit-driven cybercriminals.   That was just one of the key points made today by the US Department of Justice Deputy Assistant Attorney General Jason Weinstein to a Senate Judiciary Subcommittee on Privacy, Technology and the Law hearing. Read More


WHITE PAPER: HP

Securing Virtualized Data Centers
Understand the real need for security solutions that can address the reality of expanding virtualization. You will also learn how HP TippingPoint's secure virtualization framework allows organizations to gain control of the virtual environment by introducing in-line security policy enforcement. Read Now

WEBCAST: Oracle

The 360 on Oracle Identity Management
Hear from your peer user about the impact of the transition, their future plans and more. While there, get your questions answered live by Oracle Identity Management experts. And learn about delivery plans, recent updates, product strategy and best practices recommendations for successful identity management implementations. Register Now!

Senator: Google, Apple sending mixed signals on tracking
Senators question Google and Apple about location tracking on their smartphones. Read More

Most companies skimp on third-party code checks, study finds
Despite all of the talk surrounding the importance of software quality, a study released today shows few companies are walking the secure development walk. Read More

LTE-based public safety network could finally become reality
Ten years after the Sept. 11 terrorist attacks, the United States government may finally be making progress on allocating spectrum for a next-generation public safety mobile broadband network. Read More

Security to take center stage at MIT Sloan CIO Symposium
Security executives from several large enterprises will take part in a panel discussion on how technology trends such as cloud computing and social networking are affecting security at the 8th Annual MIT Sloan CIO Symposium to be held at MIT in Cambridge, Mass., May 18. Read More


WHITE PAPER: F5 Networks

Securing Web Presence with DNSSEC
This article discusses DNSSEC , a series of DNS protocol extensions which ensure the integrity of data returned by domain name lookups by incorporating a chain of trust into the DNS hierarchy. Read now!

Malware writers gunning for Google Android
Symbian and Microsoft Windows Mobile platforms have been the proving ground for mobile malware over the past five years, but a new Juniper Networks report states that Google Android now takes "the crown" as the platform getting the most attention from malware developers. Read More

Living legends of networking
Read More

Universities that get security right
Professor Corey Schou was working in his school's library when he realized his computer was picking up a particularly strong Wi-Fi signal. Read More

India defends right to access personal data
The Indian government said Tuesday that new rules allowing it to access personal information available with Internet companies have inherent checks and balances against misuse. Read More


WEBCAST: F5 Networks

Secure DNS with BIG-IP v10.1 DNSSEC
Domain Name System (DNS) provides one of the most basic but critical functions on the Internet. If DNS isn't working, then your business likely isn't either. Secure your business and web presence with Domain Name System Security Extensions (DNSSEC) on F5 BIG-IP v10.1 Learn more now!

Data center anti-DDoS package on tap from Arbor
Arbor Networks today announced security gear designed to work in the enterprise data center to detect and mitigate distributed denial-of-service (DDoS) attacks that crush network availability or tie up servers. Read More

25 ways IT will morph in the next 25 years
Imagine a world where the computers, networks and storage systems are all tens of thousands of times faster than they are today -- and then think about the sci-fi type of applications that will be possible. Read More

Network World's Wider Net
Network World started its Wider Net stories in 2003 in an effort to lighten up our news pages, acknowledging that there is a lot more to the world of enterprise networking and IT other than speeds and feeds of switches and routers and WAN links. Read More

Network World reporters reflect on their favorite moment
Reporters and editors talk about their favorite moment as a journalist in the technology field. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a 5-day Microsoft Licensing Tricks class teaching negotiation tips; a Polycom system. From Cisco Subnet: 15 copies of Cisco Unity books. Enter here.

SLIDESHOWS

So you think you know networking?
Network World has been around now for 25 years, and in that time the technology it covers has changed dramatically. It's been quite a ride. Here's a brief quiz to test your knowledge of some of what's been happening over that time.

MOST-READ STORIES

  1. Microsoft to acquire Skype for $8.5 billion
  2. 5 innovative tech companies that got it wrong in the end
  3. HP counters Cisco with new switches, architectures
  4. 25 ways IT will morph in the next 25 years
  5. Windows Phone 7 will be No.1 smartphone by 2015
  6. Cisco lands Juniper's Yen
  7. Room 77, taking the surprise out of hotel rooms
  8. iPhone 5 rumor roundup for week ending May 6
  9. Google Images adds 'sort by subject' feature
  10. Steve Jobs on the MobileMe fiasco and other anecdotes

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as lisab509.pcnews@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment