Tuesday 26 April 2011

Google crushes, shreds old hard drives to prevent data leakage

Google is Spying on You, Too | Unsecured Wi-Fi router brings federal agents, assault rifles on early morning visit

Network World Security

Forward this to a Friend >>>


Google crushes, shreds old hard drives to prevent data leakage
A new look into Google's data centers shows extensive security measures and the destruction of old hard drives to prevent leakage of customer data. Read More


RESOURCE COMPLIMENTS OF: VIPRE Antivirus Business

Fast and Easy has never been so good.
When it comes to antivirus protection, you deserve FAST and EASY: FAST scan times, EASY deployment, FAST threat detection, EASY administration, FAST system performance, and EASY-to-use management console. VIPRE Antivirus Business: the protection you need, the performance you deserve. Test drive VIPRE today.

WHITE PAPER: Sophos

Why Hackers have turned to Malicious JavaScript Attacks
Reaching unsuspecting users through the web is easy and effective and hackers now use sophisticated techniques—like injecting inline JavaScript—to spread malware. Learn more about this threat, how it works and how cybercriminals make money with these types of attacks. Read now.

Google is Spying on You, Too
I guess you know I was be facetious in my last entry when I said that Google wouldn't spy on your location as Apple has now been exposed as so doing. In fact, I had no doubt whatsoever that Google wouldn't pass up such an opportunity, and now the Wall Street Journal has verified this fact. My reaction is the same. Shame on you, Google. Evil? Indeed. Read More

Unsecured Wi-Fi router brings federal agents, assault rifles on early morning visit
A Buffalo homeowner found himself facedown on the floor of his house, looking up a group of federal agents, who were looking at him over gun barrels. They were executing a warrant alleging he was downloading reams of child pornography over the Internet. He was baffled. Read More


WEBCAST: Juniper Networks

Securing the Next-generation Datacenter
For the security teams responsible for safeguarding corporate IT assets, these trends present a host of challenges, necessitating several new capabilities and approaches to ensure ongoing, effective security Learn more!

ASA Tech Tip: Deploy SSLVPN and VMware View Securely
My previous article compared the security features between Citrix XenDesktop and VMware View VDI solutions. This time around I will cover how to securely deploy VMware View with Cisco SSLVPN when you don't control or can't trust the host that View will be running on. As the bring your own PC to work craze heats up and VDI catches on as the preferred access method for B2B partners, vendor and contractor... Read More

Michigan State Police reply to ACLU about cell phone data extraction devices
The Michigan State Police do not seem to appreciate the publicity raining down on it over Fourth Amendment rights and its use of Universal Forensic Extraction Devices (UFED) which can extract data off 95% of cell phones on the market. The ACLU was quoted a half million dollars as the cost of documents associated with a FOIA request. I reported on it last week as State Police can suck data out of cell... Read More


WHITE PAPER: Sophos

Malicious JavaScript Attacks: What Can You Do?
As an IT manager, you need to be able to effectively secure all of the websites you manage to avoid attack and the subsequent infection of site visitors. You also need to protect the users within your organization from becoming victims of malware. We'll review what to watch for, as well as the security strategies that will help keep you safe. Read more

Windows Event Log Tricks
I was at a customer site the other day to look over some data center design plans. Of course like many things in a day in a life of a networking geek, flexibility is the key to getting to beer time quicker. The IT folks where in hot debate about something so I just assumed it was who was the BEST Dr. Who. I walked over wishing I had my long scarf and fist full of jelly babies to pelt folks that didn't... Read More

CSA, ISO partner on cloud security standards
CSA says it will have a key role in the development of cloud security and privacy standards under the ISO/IEC. Read More

Sony "rebuilding" PlayStation Network after attack
The outage of Sony's PlayStation Network and Qriocity service, now in its fourth day, looks set to continue after the company said on Sunday that it is "rebuilding" its system to better guard against attacks. Read More

Data breach fines can risk more harm than good, experts say
Are regulatory and security breach fines protecting the consumer, or beginning to unduly drive security policy? As penalties begin to be levied against organizations who have been attacked, or employees violated data policy, some experts now question whether the government is penalizing one of the victims in a crime, rather than helping to mitigate the risk of identity theft -- as the laws were first intended. Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a 5-day Microsoft Licensing Tricks class teaching negotiation tips; a Polycom system. From Cisco Subnet: 15 copies of Cisco Unity books. Enter here.

SLIDESHOWS

13 cool features of Office 365
Microsoft released the official beta version of Office 365 today, but we've been playing with it for a while now. Here are 13 cool features of the cloud-based service that combines Office, SharePoint, Lync and Exchange.

MOST-READ STORIES

  1. U.S. goes after some game-changing energy projects
  2. Sony "rebuilding" PlayStation Network after attack
  3. Fave raves: 22 IT pros name their favorite products
  4. Open source is expensive
  5. State police can suck data out of cell phones in under 2 minutes
  6. Quora: The next social network IT pros need to know?
  7. Finger pointing? These products get IT off the hook
  8. What's so great about Spiceworks?
  9. How to solve Windows 7 crashes in minutes
  10. Top 10 smartphone Easter eggs

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as lisab509.pcnews@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment