Search This Blog

Tuesday, November 30, 2010

US shutters 82 domain names citing counterfeit goods sales, copyright problems

Data breaches: 4 fundamental ways to shore up your defenses | Free Speech, Privacy & Cyberstalkers - Help For Those With Personal Cyberstalking Terrorists

Network World Security

Forward this to a Friend >>>


US shutters 82 domain names citing counterfeit goods sales, copyright problems
US government shuts down websites selling everything from sports equipment to music and softwareThe US has dropped a hammer on 82 domain names saying those of commercial websites engaged in the illegal sale and distribution of counterfeit goods and copyrighted works. Can US get tough on intellectual property crime? Read More


RESOURCE COMPLIMENTS OF: VeriSign, Inc.


VeriSign® SSL Certificates now come with new features! Learn more!

WEBCAST: Netop

Best Practices for Remote Support
Join this live Webcast December 7th at 1 PM ET to hear practical advice on deploying remote support without putting your organization at risk. You'll learn how companies from regulated industries are implementing remote support and since this event is live, you'll have a chance to ask the experts your specific questions. Join us for this Live Event

Data breaches: 4 fundamental ways to shore up your defenses
If you're like most IT professionals, you constantly feel as if you should be paying more attention to security. But it's tough to find the time, budget and staff to do the best job possible. Read More

Free Speech, Privacy & Cyberstalkers - Help For Those With Personal Cyberstalking Terrorists
Cyberstalkers may hide behind free speech, anonymous comments and their right to privacy, but there are steps to take if you are being cyberstalked or suffering from another form of electronic aggression.In the United States, we highly value free speech. It is a wonderful right, but there are truly twisted people who hide behind freedom of speech and the right to privacy by being anonymous online. Just because we can say most anything anonymously, doesn't mean we should. People joke online about cyberstalking others, but the reality is that the U.S. Read More

Cisco Releases AnyConnect SSLVPN client for iPad
Securely connect iPads to the corporate networkThe Cisco AnyConnect Secure Mobility SSLVPN iPad client will soon release to the Apple App store. Before the iPad specific version releases though you can use the iPhone version of AnyConnect on any 4.2+ version iPad. The AnyConnect client allows your iPad users to VPN back to a Cisco ASA headend device located at your office or corporation. The client supports both an auto launch on-demand mode... Read More


WHITE PAPER: Symantec

Next Generation Data Protection
These next generation tools, such as disk based backups, deduplication, virtualization, archiving, and continuous data protection, are essentially revolutionizing the world of data protection. download this whitepaper to find the newest approach to unified data protection. Read now!

Is Open Source Less Secure? Why Don't SMBs Have More Choices?
HP Security Evangelist Rafal Los discusses open sourceBefore the Thanksgiving holiday I wrote a post about the security of open source apps in the health care field. It was itself in response to a post written by Rafal Los, a security researcher and evangelist with HP. Read More

Who wants to be a cyber-security warrior?
National Science Foundation program looks to increase cyber security specialistsThe National Science Foundation is again trying to increase the amount of well-educated people willing to work for the government to secure online resources. Read More

New ESG Research Report Points To Security Vulnerabilities In the US Critical Infrastructure
Cyber supply chain security weaknesses aboundIn 1998, then President Bill Clinton recognized that the United States was especially vulnerable to a cyber attack to its critical infrastructure. Clinton addressed Critical Infrastructure Protection (CIP) by issuing Presidential Directive 63 (PDD-63). Soon after PDD-63, Deputy Defense Secretary John Harme cautioned the US Congress about the importance of CIP by warning of a potential "cyber Pearl... Read More


WHITE PAPER: Quest Software

Combating Security and Compliance Challenges
Don't wait for a security breach or compliance issue to damage your company. Ongoing monitoring can proactively identify and reduce threats. Learn how you can successfully stop security issues before they become serious problems. Read More

8 Great Kinect Hacks
Kinect hacking is taking off at blinding speed. Microsoft's Kinect motion controller for XBox 360 is less than a month old, and it's been barely two weeks since Adafruit announced a winner in their Open Kinect competition. Since the, Microsoft has tacitly endorsed opening up the Kinect as a platform, and it seems like there's a new Kinect hack every couple of hours. It can be tough to keep up with a phenomenon that's gone from nothing to a full blown scene in less than a month, so as a service to you we're rounding up GeekTech's favorite Kinect hacks. Read More

Online shopping scams and why people fall for them
Checking email, logging onto Facebook and IMing with friends are all common activities people engage in during break time at the office. But today, social networking may take a backseat to online shopping for holiday gifts. Known as Cyber Monday, the first Monday after Thanksgiving is the day online retailers expect to see an uptick in activity as the population heads back to work, giving them access to work computers and, as a result, an opportunity to start holiday shopping. Read More

Consumers demand compulsory public data loss disclosures
Eighty percent of UK consumers support compulsory public data loss disclosures by organisations, reasearch has shown, in response to continuing data breaches. Read More



Fill out a survey, get rewarded

Get a free Starbucks gift card for participating in a Network World survey about application performance management best practices. Research firm NetForecast is surveying enterprises about APM practices for an upcoming Network World article. The first 100 participants will receive a $5 Starbucks gift card. Click here.

Goodies from the Subnets
We've got SharePoint 2010 training for up to three people from Webucator up for grabs. There's an iPad available, too. Enter to win one!

SLIDESHOWS

Top IT Turkeys of 2010
Thanksgiving is a time for giving thanks for all of the people and things we love, to cherish what's most important to us. But that's for another slideshow. This one's all about taunting the companies, products and people who most resembled a turkey over the last year. So cut me a hockey-puck-shaped slice of jellied cranberry sauce and read on.

Cool Yule favorites: 15 techie gifts we like
Ho Ho Ho, it's time again to get our holiday wish lists together. Here are our 15 favorite products from the 140+ products submitted and tested in this year's Cool Yule Tools holiday gift guide.

MOST-READ STORIES

  1. WikiLeaks: China was behind Google hack
  2. 5 Cyber Monday Web sites for finding great deals
  3. Report says Apple iPad 2 to have two cameras, USB port
  4. Cisco losing more steam in Layer 4-7
  5. A week with Windows Phone 7
  6. One less thing: Apple bans Steve Jobs doll
  7. Comcast outage encourages DIY DNS fix for some
  8. Comcast outage hits Boston, East Coast cities
  9. 10 amazing Black Friday laptop deals
  10. Microsoft Lync 2010 puts the "U" in UC

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: