Your Ad Here

Friday, January 29, 2010

Network Security Not Priority for iPad

eSecurity Planet


Friday January 29, 2010

Network Security Not Priority for iPad
By Michelle Megna - January 29, 2010
The new iPad offers apps and mobility useful to business, but it lacks important security measures, such as support for a VPN.

Improve Information Security with PHP Script
By W. Jason Gilmore - January 29, 2010
In this tutorial, learn how to securely execute a variety of system-based commands via a PHP script in order to build Web applications that can tightly integrate with both the operating system and third-party software.

Facebook, LinkedIn Resist New Privacy Regs
By Kenneth Corbin - January 28, 2010
Leading social sites urge regulatory restraint over consumer data collection practices.

National Archives Breach Exposes D.C. Insiders' Data
By Larry Barrett - January 28, 2010
A hard drive with data including the personal information of more than 250,000 people has gone missing from the National Archives and Records Administration.

Cyber Attack Threat Keeps CEOs Up at Night
By Larry Barrett - January 28, 2010
Forty percent of IT executives are bracing for a major security incident in their sector within the next year, and only 20 percent think they'll avoid a cyber attack in the next five years.

Privacy Bill Nears Introduction in House
By Kenneth Corbin - January 28, 2010
Chair of House Internet subcommittee says work on draft discussion of privacy overhaul legislation is almost complete, touts plans for wireless overhaul.

1/29: Backdoor.Tidserv.K Trojan Horse--And Other Malware You Should Know About
By eSecurityPlanet Staff - January 29, 2010
A summary of the day's virus and other threats.

Get Ready for Windows 7!
Pros and Cons? Learn What Our Experts Think
Download Free eBook Now. Click Here.
Interested in placing your TEXT AD HERE? Click Here
 
Is the U.S. Gearing Up for Cyber War?
By Kenneth Corbin - January 27, 2010
With cyber threats from abroad coming fast and furious, how serious is the United States about going on the offensive?

Google Outs Cyber Spies
By Gerry Blackwell - January 28, 2010
Google’s full disclosure on cyber espionage activity in China may just kick start a much needed international debate.

Obama Cyber Czar Digs in For Long Haul
By Kenneth Corbin - January 27, 2010
After one month heading up Obama administration's top cybersecurity spot, Howard Schmidt sees plenty of opportunities-and plenty of work.

Apache SpamAssassin Takes a New Route in Version 3.30
By Sean Michael Kerner - January 27, 2010
The widely deployed open source antispam engine gets its first major update in two years, with changes aimed at better tackling the problem of spam.

U.S. Oil Companies Targets of 'Tenacious' Cyber Attacks
By Larry Barrett - January 27, 2010
Senior executives at major oil firms were hit with a series of unsolicited e-mails containing malware designed to steal key proprietary data.

Data Breach Costs Surge in 2009: Study
By Larry Barrett - January 26, 2010
Ponemon Institute and PGP Corp. study finds average security breach incident costs companies more than $6.7 million in 2009.

China Denies Role in Cyber Attacks
By Kenneth Corbin - January 25, 2010
Government steps up defense of Internet policy in comments to state news agency as more sites come under attack.

Hard Drives Pilfered from BlueCross BlueShield
By Larry Barrett - January 25, 2010
Between 220,000 and 500,000 members' Social Security numbers, birth dates, medical information, and addresses were stored on dozens of disks swiped from the insurer's Chattanooga, Tenn. call center.






The Network for Technology Professionals

Search:

About Internet.com

Legal Notices, Licensing, Permissions, Privacy Policy.
Advertise | Newsletters | E-mail Offers

All newsletters are sent from the domain "internet.com." Please use this domain name when configuring e-mail or spam filter rules, if you use them.

No comments:

Post a Comment

statcounter