RefBan

Referral Banners

Tuesday, June 21, 2011

How to Protect Your Privacy on Facebook; Password Security Remains Weakest Link Even After Data Breaches

Don't miss a single issue of eWEEK.com Securing the Enterprise. Add newsletters@response.eweek.com to your address book. View newsletter in a browser
eWEEK.com Securing the Enterprise Securing the Enterprise
HOME NEWS REVIEWS OPINIONS BLOGS VIDEOS PODCASTS SUBSCRIBE
Security | Security | Channel | Infrastructure | CIO | ALL TOPICS
TOP STORIES - June 21, 2011
How to Protect Your Privacy on Facebook
Password Security Remains Weakest Link Even After Data Breaches
Lawmakers Add 48-Hour Rule to Data Breach Notification Bills
Virus, Malware Activity Increased in May, Spam Levels Flat
Smarter Implants Shielded From Cyber-Attack
SPOTLIGHT
Apple's iOS Stats Put Android's to Shame
Android, despite its soaring popularity, has some work to do when it comes to becoming as popular a mobile platform as iOS.
READ MORE >>
BEST OF eWEEK
New Samsung Chromebook Impresses
Why Google Wallet Will Fail to Cash In
IBM's Top 25 Acquisitions
3D Printers Hit the Mainstream
FEATURED VIDEO
2011 Tech Innovations
How top 10 tech innovations of 2011 impact small and medium-sized businesses.
WATCH NOW >>
MOST READ STORIES
Galaxy Tab 10.1 Takes Aim at iPad 2
IBM at 100: Biggest Hits and Misses
Why iPad 3 Should Be Released This Year
Features We Expect to See in iPhone 5
IN THIS ISSUE
How to Protect Your Privacy on Facebook
Facebook, much to the annoyance of some, regularly adds new features to the site without notifying users. These features are supposed to enhance a user's experience and make the popular social networking site more personal. However, many times these features invade a person's privacy without him or her knowing it. We look at some ways to protect personal privacy and enhance security within Facebook.
READ MORE >>

Password Security Remains Weakest Link Even After Data Breaches
Despite repeated reminders to select strong passwords and not to reuse them across Websites and services, online users continue to be frighteningly lax in their password security, according to a recent analysis of leaked passwords.
READ MORE >>

Sponsored by Symantec.cloud


Visit the new Security Solution Center on eWEEK.com for the latest IT security news, reviews, videos, and resources.
Go to the Security Solution Center
ADVERTISEMENT
Lawmakers Add 48-Hour Rule to Data Breach Notification Bills
U.S. Sens. Jay Rockefeller and Mark Pryor joined U.S. Rep. Mary Bono Mack in filing legislation that requires companies to notify customers about data breaches within 48 hours of when an incident assessment is completed.
READ MORE >>

Virus, Malware Activity Increased in May, Spam Levels Flat
While email-borne malware and viruses increased dramatically in May, overall spam volumes remained flat, according to the monthly threat analysis from AppRiver.
READ MORE >>

Smarter Implants Shielded From Cyber-Attack
Medical implants today receive wirelessly transmitted instructions from physicians regarding how to dispense their therapy, opening them to cyber-attacks that could potentially be fatal. However, a novel shield technology could secure access to the implants by virtue of an add-on medallion worn by the patient.
READ MORE >>

Featured White Papers
Oracle Databases on VMware vSphere 4: A Guide
This document will also show that the same best practices, tuning tips and tricks, and skill sets necessary to deploy Oracle databases in physical environments can be leveraged when deploying Oracle databases in virtual environments.
DOWNLOAD NOW >>

How to Get Started with Cloud Computing
View this panel discussion with IBM cloud computing leaders on how enterprises can get started with cloud computing -- reviewing which workloads make sense to move first and the right type of cloud for workloads.
DOWNLOAD NOW >>


Featured Webcasts
Keeping Yourself Secure in the Cloud: An Identity-based Approach
Jun 29, 2011 at 1:00 p.m. Eastern / 10:00 a.m. Pacific (60 minutes)
Register today for our informative eSeminar to learn about the latest cloud threats and how identity technology can help resolve many access concerns and set your company on a safe course to the cloud.
REGISTER >>

Unleashing the Potential of Today's Multi-Generational Workforce
Jun 29, 2011 at 12:00 p.m. Eastern / 9:00 a.m. Pacific (60 minutes)
Join eWEEK for this live, interactive webcast, sponsored by IBM, and hear from industry experts regarding what tools and processes need to be put in place to accommodate a multi-generational workforce. Attend this online-only event and learn what tools and techniques work best to motivate and integrate the next generation of workers into your organizational structure.
REGISTER >>


Sign up for complimentary digital subscriptions to eWEEK, CIO Insight and Baseline magazines and receive a 360 view of today's technology arena. eWEEK gives you expert products reviews that help you choose the best technologies for your organization. CIO Insight provides a high-level look at technologies and processes, that enable you to design IT strategies that support your entire enterprise. And Baseline takes you to the front lines, with in-depth case studies of how your peers in other companies integrate technology with business and bring real value to their organizations. Sign Up Today.

eWEEK Newsletter Information
You are currently subscribed to the eWEEK.com Securing the Enterprise newsletter as: dwyld.kwu.wyldside@blogger.com
If you no longer wish to receive eWEEK.com Securing the Enterprise, unsubscribe here

Ziff Davis Enterprise
28 East 28th Street
New York, New York 10016
Privacy Policy

No comments: