Security News AlertNetwork World's Security News Alert, 07/12/07FCC ignores more than 100 years of wisdom, 07/09/07: In 1883 French cryptographer Auguste Kerckhoffs published a set of six design principles for military encryption systems. The second of these principles is generally known today under the observation that security through obscurity is not security. The FCC seems not to have read the history books or to be aware of how its sister federal agencies develop security standards. Illinois puts pizazz back in PKI, 07/11/07: State of Illinois had placed a big bet on public-key infrastructure (PKI) for e-commerce, but that was becoming a losing bet three years ago as state agencies floundered with issuing digital certificates. Secure Computing releases two-factor authentication for mobile access, 07/11/07: Secure Computing releases mobile software that provides two-factor authentication for remote access to corporate networks and data.
As image spam declines, PDF spam ready to take its place, 07/11/07: Vendors agree image spam is finally on the decline, but a new scam called PDF spam is emerging to take its place. Apple fixes serious QuickTime flaws Cisco Unified Communications Manager, Presence Server open to attacks: Cisco Unified Communications Manager contains two overflow flaws that could make it vulnerable to DOS attacks. Separately CUCM and Cisco Unified Presence Server contain two vulnerabilities that could allow an unauthorized administrator to activate and terminate CUCM/CUPS system services. Cisco fleshes out NAC with profiler product: Cisco is OEMing Great Bay Software's Beacon Endpoint Profiler to offer as part of its NAC lineup, according to ZDNet UK. The best emerging security technology: Share your thoughts and get a chance at a free, signed copy of author Tyson Kopczynski's lastest book. But hurry. He'll pick a winner this week. |
| Contact the author: Senior Editor Ellen Messmer covers security for Network World. E-mail Ellen. BONUS FEATUREIT PRODUCT RESEARCH AT YOUR FINGERTIPS Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details. PRINT SUBSCRIPTIONS AVAILABLE International subscribers, click here. SUBSCRIPTION SERVICESTo subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here. This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription. Advertising information: Write to Associate Publisher Online Susan Cardoza Network World, Inc., 118 Turnpike Road, Southborough, MA 01772 Copyright Network World, Inc., 2007 |
No comments:
Post a Comment