Monday, November 30, 2015

Walmart hired Lockheed Martin for employee surveillance, allegedly got help from FBI

Welcome to the Internet of stupid (hackable) things | Most hackable devices

Network World Security

Walmart hired Lockheed Martin for employee surveillance, allegedly got help from FBI
It’s not unusual for companies to monitor social media in order to ‘protect’ their brands; Microsoft, for example, makes dossiers on journalists who write about the company. Yet Walmart allegedly “is always watching” and went the extra distance to spy on employees by hiring defense contractor Lockheed Martin and allegedly even received help from the FBI.Walmart was most interested in gathering surveillance of employees involved with the group OUR Walmart which planned Black Friday protests in 2012. OUR Walmart was advocating for higher wages, predictable schedules, better healthcare coverage, and the right to unionize. Walmart’s surveillance efforts were described in over 1,000 pages of “emails, reports, playbooks, charts, and graphs as well as testimony,” according to Bloomberg Businessweek which reviewed the documents. The testimony, which was given earlier this year to the National Labor Relations Board, claims Walmart hired Lockheed Martin and received help from the FBI Joint Terrorism Task Force.To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: Neustar Inc

10 Cyberthreats Outside the Firewall
Unfortunately for the IT Administrator, security vulnerabilities are not found exclusively in the cyber domain. Here is a list of ten current threats that can cause real damage to an organization's bottom line, brand, and reputation- all of which exist outside of a company's firewall. Learn More

WEBCAST: Sophos Inc

Hackers Communicate; Your Security Technologies Should Too
It's time to close the gap left open by layered, standalone security tools and share contextual information. Using numerous point products that work in a vacuum no longer provides adequate defense. Learn More

Welcome to the Internet of stupid (hackable) things
It’s easy enough for technology writers to get breathless when writing about the Internet of Things. The headlines almost write themselves – a gee-whiz technology that takes “dumb” everyday objects, puts a chip into them, and makes them “smart.” And when everything is connected to and communicating with everything else, our lives will be immeasurably easier, infinitely more efficient and productive … yadda yadda yadda. Except, maybe, the Internet of Things is starting to show its flaws, not just in giving us things and connectivity that we don't really need, but also in creating security gaps that never would have existed before, and putting people and your company at risk. To read this article in full or to leave a comment, please click here Read More

Most hackable devices
Consumer devices vulnerableThere are now more than 3 billion connected devices in use by consumers, according to Gartner, and this number will increase to 4 billion next year.A big chunk of that increase will come as a result of the holiday season, when 65 percent of Americans say they plan to buy consumer electronics gifts, according to an October report by the Consumer Electronics Association. The amount of spending on tech will reach $34.2 billion, making the the biggest tech shopping season on record, according to Shawn DuBravac, CEA’s chief economist and senior director of research.To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: Unisys

Security is Dead. Long Live Security.
A fresh approach to security is needed - one that understands that organizations aren't perfect, and that adversaries are motivated to attack - will tip the balance of power back to the good guys. This fresh approach is based on assumption that bad guys will get in, but that the damage they do must be limited. Micro-segmentation can do just that. Learn More

7 hot Cyber Monday Apple tech deals
While Apple hasn’t formally promoted a Black Friday or Cyber Monday sale, other retailers have picked up the slack when it comes to Apple iPhones, iPads, Apple Watches and Apple TVs. Leading the way on Apple deals are Best Buy (well, actually mainly Best Buy), but also Target.  (Websites such as BFads.net, BlackFriday.com and BestBlackFriday.com have all been helpful in collecting this information.)  MORE: Apple unveils holiday gift guideTo read this article in full or to leave a comment, please click here Read More

Microsoft enables potential unwanted software detection for enterprise customers
It’s time to throw adware, browser hijackers and other potentially unwanted applications (PUAs) off corporate networks, Microsoft has decided. The company has started offering PUA protection in its anti-malware products for enterprise customers.The new feature is available in Microsoft's System Center Endpoint Protection (SCEP) and Forefront Endpoint Protection (FEP) as an option that can be turned on by system administrators.PUA signatures are included in the anti-malware definition updates and cloud protection, so no additional configuration is needed.Potentially unwanted applications are those programs that, once installed, also deploy other programs without users' knowledge, inject advertisements into Web traffic locally, hijack browser search settings, or solicit payment for various services based on false claims.To read this article in full or to leave a comment, please click here Read More


: Ping Identity Corporation

Identity-Defined Security
Managing identities across partners redefines the security perimeter. Ping Identity founder Andre Durand recently discussed the company's vision of identity-defined security to secure all users, devices, networks and applications. Read his Q&A here. Learn More

VPN bug poses privacy threat to BitTorrent downloaders
A bug affecting some VPN services can be used to figure out a computer's real IP addresses, including those of BitTorrent users, which could pose a huge privacy and possibly a legal risk.The vulnerability affects those services that allow port forwarding, according to VPN provider Perfect Privacy, which wrote about the issue on Thursday.A successful attack requires a couple of conditions to be met: the attacker must be on the same VPN network as the victim, who also has to be lured into connecting to a resource controlled by the attacker.To read this article in full or to leave a comment, please click here Read More

Connected cars gather too much data about their drivers, say motorists associations
Car drivers may imagine they have greater privacy than public transport users, but that isn't necessarily the case in modern, connected cars, European motoring organizations warned this week.To help identify faults or plan maintenance, manufacturers are able to gather performance data from connected cars such as the total distance travelled, or the length and number of trips made.But drivers may be unaware of just how much other information such cars allow manufacturers to gather about them.A study conducted by German motorists organization ADAC for European lobby group FIA Region 1 found that in addition to trip and distance data, one recent model reported maximum engine revolutions, the status of vehicle lights -- and far more besides.To read this article in full or to leave a comment, please click here Read More

InfoWorld's 2015 geek gadget gift guide
The technology gifts you won't find simply anywhereThe gift-giving holidays are fast approaching, and geeks across the world are dreaming about techno toys. In the spirit of spreading holiday cheer of the gadget variety, InfoWorld presents our picks for the coolest gadgets for the gift-giving season tailor-made for that special geek in your life.To read this article in full or to leave a comment, please click here Read More

Microsoft beefs up security products to block adware
Microsoft is adding a new opt-in defense for enterprises to block adware, which is often sneakily wrapped into free downloads.Adware is often classified as a potentially unwanted application, or PUA, an industry term for applications that aren't necessarily malware but could be a security or performance risk."These applications can increase the risk of your network being infected with malware, cause malware infections to be harder to identify among the noise, and can waste helpdesk, IT, and user time cleaning up the applications," according to a Microsoft blog post.To read this article in full or to leave a comment, please click here Read More


SLIDESHOWS

The 10 mightiest supercomputers in the world

The latest Top500 supercomputer rankings are out today, to coincide with the annual SC15 conference, which is being held this year in Austin, Texas.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 3 hot Apple Watch deals on Black Friday & Cyber Monday

2. 10 products that big tech companies have open-sourced recently

3. What you need to know about Dell's root certificate security debacle

4. What would the perfect Linux distro look like?

5. 19 free cloud storage options

6. Dell admits installing security hole on laptops, apologizes, offers fix

7. Apple Watch 2 rumors start heating up

8. 7 free Wi-Fi stumbling and surveying tools for Windows and Mac

9. 6 chef-caliber cooking gadgets for the connected kitchen

10. 3 types of private clouds: Which one's right for you


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


ads

Ditulis Oleh : Angelisa Vivian Hari: 7:15 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive