Search This Blog

Thursday, August 27, 2009

States, school districts trying to get ahead of sexting craze; Symantec offers fix for buggy Norton patchziness;

States, school districts trying to get ahead of sexting craziness; Symantec offers fix for buggy Norton patch
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile


Sponsored by Tripwire
rule

CCM for IT Compliance and Risk Management
Learn from industry analysts how IT organizations are using configuration management to meet compliance requirements and instill best practices. Find out how these organizations are applying the resulting processes to enhance security and improve operational efficiency in order to increase their level of service delivery.

Click here.

rule

Spotlight Story
Trojan attacks up, phishing attacks down this year, IBM finds

Spam-based phishing attacks declined noticeably during the first half of the year, but cyber-criminals may simply be shifting to other technologies found to be more effective in stealing personal data, according to IBM in its semi-annual security threat report . Read full story

Related News:

States, school districts trying to get ahead of sexting craziness
One of the biggest school districts in the country is trying to squelch the rampant scourge of sexting or the practice of sending nude or semi-nude photos by cell phone. In Houston, the school district this week adopted a no "sexting" rule that states distribution of nude or semi-nude photographs or videos by text message will not be tolerated.

Symantec offers fix for buggy Norton patch
Symantec has posted a software fix after hundreds of users reported problems with a buggy update of the company's flagship Norton AntiVirus software.

Identity theft resource center
Identity theft (IDT) continues to grow in the US and the world as electronic personally identifiable information (PII) about all of us increases in volume and dispersion. The Identity Theft Resource Center® (ITRC) provides excellent resources to help information assurance (IA) professionals and the public keep informed about current IDT developments and countermeasures.

Gigabit Ethernet fit for a tank
Ethernet continues to go places its inventors probably never imagined. This week GE Fanuc Intelligent Platforms got a $645,000 contract to supply a custom version of its Gigabit Ethernet switch to rumble around inside the US Army's Abrams tank.

Unmasking DLP: The Data Security Survival Guide
You've heard from all the vendors who claim to have just the thing for your DLP needs. But how do you know what's best for your company's particular security needs? In this series, CSOonline talks to IT security practitioners, vendors and analysts about what is and isn't true DLP.

Cyber crooks increasingly target small business accounts
The NACHA electronic payments association is warning its 15,000 member of increasing attacks by cyber criminals on small businesses using electronic payment networks.

Five Lessons from Microsoft on Cloud Security
While Google, Amazon and Salesforce have gotten the most attention as cloud service providers, Microsoft-with its 300 products and services delivered from its data centers-has a large cloud bank all its own.

Hackers like Christmas best of all
Most people may be busy with year-end gift buying and holiday parties at the end of December, but security professionals have an added obligation: keeping the hackers off their corporate networks.

August Giveaways
Cisco Subnet is giving away training from Global Knowledge and 15 copies of Practical Intrusion Analysis; Microsoft Subnet is giving away training from Global Knowledge and 15 copies of SCCM 2007 Unleashed. Google Subnet is giving away 15 copies of Web Geek's Guide to Google Chrome. Entry forms can be found on the Cisco Subnet, Microsoft Subnet and Google Subnet home pages. Deadline for entries is August 31.

Network World on Twitter? You bet we are


10 sports technologies to love, 5 to hate
Sports technologiesMany technologies help fans enjoy sports. Others just annoy.

Apple disasters
Apple disastersApple has enjoyed huge success with the iPod and iPhone, but Apple has had a number of commercial flops, too.

IBM ISS X-Force Threat and Risk Report
Read this Trend and Risk report from IBM® ISS X-Force® to learn statistical information about all aspects of threats that affect Internet security, including software vulnerabilities and public exploitation, malware, spam, phishing, web-based threats, and general cyber criminal activity.
Read Now


Sophos Security Solution Center
With the threat landscape constantly changing, you need to have comprehensive protection that isn't complicated. With Sophos, you get complete protection for less investment. You get best-in-class threat protection, and data security and compliance that are simple and affordable so you can get more out of your existing security budget. Review timely resources at this Solution Center.
Visit this site today!

 

August 27, 2009

TOP STORIES | MOST DUGG STORIES

  1. The opposite of Twitter
  2. 12 words you can never say in the office
  3. Judge overturns 2007 Unix copyright decision
  4. Cisco Wi-Fi vulnerability could open 'back door'
  5. Microsoft, Citrix no longer sponsoring VMworld
  6. Air Force, NASA fire environmentally friendly rocket
  7. Personal spy gear: Is it ethical? Legal?
  8. Obsolete technology: 40 big losers
  9. Is Cisco ACS 5.0 worth the upgrade?
  10. Back-to-school quiz for techies

Avoiding Security Breaches
Discover effective tools and strategies for gaining regulatory compliance, avoiding security breaches and enforcing tight security. Learn how to recover from a data breach, the latest in security best practices, how you can achieve compliance while saving money, and more.
Click here.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: