Search This Blog

Monday, August 31, 2009

FTC rules outlawing those damned annoying robocalls hit Sept. 1;Researchers target system to surgically jam specific digital signals

FTC rules outlawing those damned annoying robocalls hit Sept. 1; Researchers target system to surgically jam specific digital signals
Network World logo

Security: Identity Management Alert

NetworkWorld.com | Update Your Profile


Sponsored by Actuate
rule

Reporting for Profitability
Think beyond the current structure of a report and personalize it with Business Intelligence Reporting Tools (BIRT) Interactive Viewer. Meet data visualization requirements faster and with less development by making BIRT web output interactive.

Learn more.

rule

Spotlight Story
U.K. launches privacy initiative

Recently I've been talking about identity-related initiatives from both the U.S. and Canadian governments. There was even a mention of some privacy issues raised by the Canadians. So as not to be overlooked, today I want to mention a new privacy initiative from the U.K. government. Read full story

Related News:

FTC rules outlawing those damned annoying robocalls hit Sept. 1
Nearly a year after announcing the plan, new Federal Trade Commission rules prohibiting most robocalls are set to take effect Tuesday, Sept. 1.

Researchers target system to surgically jam specific digital signals
Electronically jamming everything from specific cell phones, satellites or any other communications device is the goal of a prototype system military scientists at Defense Advanced Research Projects Agency want to build.

China game boss sniped rivals, took down Internet
An attack by a Chinese online game provider meant to cripple the servers of its rivals ballooned to cause an Internet outage in much of the country in May, according to police.

Security test prompts federal fraud alert
A sanctioned security test of a bank's computer systems had some unexpected consequences this week, leading the federal agency that oversees U.S. credit unions to issue a fraud alert.

FBI investigating laptops sent to U.S. governors
The U.S. Federal Bureau of Investigation is trying to figure out who is sending laptop computers to state governors across the U.S., including West Virginia Governor Joe Mahchin and Wyoming Governor Dave Freudenthal. Some state officials are worried that they may contain malicious software.

ACLU sues for information on laptop searches at U.S. borders
The American Civil Liberties Union is suing the U.S. Department of Homeland Security (DHS)'s Customs and Border Protection (CBP) unit for information on its policies related to searches of laptops and other electronic devices at U.S. borders.

August Giveaways
Cisco Subnet is giving away training from Global Knowledge and 15 copies of Practical Intrusion Analysis; Microsoft Subnet is giving away training from Global Knowledge and 15 copies of SCCM 2007 Unleashed. Google Subnet is giving away 15 copies of Web Geek's Guide to Google Chrome. Entry forms can be found on the Cisco Subnet, Microsoft Subnet and Google Subnet home pages. Deadline for entries is August 31.

Network World on Twitter? You bet we are


10 sports technologies to love, 5 to hate
Sports technologiesMany technologies help fans enjoy sports. Others just annoy.

Apple disasters
Apple disastersApple has enjoyed huge success with the iPod and iPhone, but Apple has had a number of commercial flops, too.

The New Security Reality
Gain the required knowledge to successfully fight social engineering attacks, comply with federal regulations, and discover the latest trends in data protection in this Executive Guide. Hear directly from your peers who have been through serious data breaches and have come out the other side stronger and more secure.
Click here.


Sophos Security Solution Center
With the threat landscape constantly changing, you need to have comprehensive protection that isn't complicated. With Sophos, you get complete protection for less investment. You get best-in-class threat protection, and data security and compliance that are simple and affordable so you can get more out of your existing security budget. Review timely resources at this Solution Center.
Visit this site today!

 

August 31, 2009

TOP STORIES | MOST DUGG STORIES

  1. Wi-Fi encryption cracked in 60 seconds
  2. 12 words you can never say in the office
  3. Robocalls outlawed as of Sept. 1
  4. 5 techs that could reinvent cell phones
  5. The opposite of Twitter
  6. High-tech blimps earning their wings
  7. Obsolete technology: 40 losers
  8. Worst co-workers ever
  9. Free tool brings analysis to Cisco ASA
  10. 2,200 broadband stimulus applications

IBM ISS X-Force Threat and Risk Report
Read this Trend and Risk report from IBM® ISS X-Force® to learn statistical information about all aspects of threats that affect Internet security, including software vulnerabilities and public exploitation, malware, spam, phishing, web-based threats, and general cyber criminal activity.
Read Now



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: