Security News AlertNetwork World's Security News Alert, 08/13/07VoIP hacker talks: Service provider nets easy pickings, 08/10/07: A combination of simple dictionary and brute-force attacks in combination with Google hacking enabled a criminal pair to break into VoIP-provider networks and steal $1 million worth of voice minutes, says one of the duo who has pleaded guilty to his crimes. Why virtual honeypots are sweet, 08/10/07: Authors of new book on “Virtual Honeypots” discusses latest security tools. U.S. gov't plans changes in air passenger screening, 08/10/07: A proposed revamp of the U.S. Department of Homeland Security air passenger screening program offers improved privacy protections, but the agency still has a ways to go, said one privacy advocate.
Career Education Corp. adopts data-leak prevention strategy, 08/09/07: Career Education Corp., which operates 80 postsecondary schools in the United States, Europe and the Middle East, has begun deploying data-leak-prevention technologies to protect sensitive student information, becoming one of the first in the education realm known to be using “extrusion detection.” Mirage makes NAC device for small offices, 08/09/07: Mirage Networks is introducing a smaller, inexpensive, branch-office network-access-control device for sites with a maximum of 15 employees, making it possible to extend NAC to locations where previously it might not have been cost-effective. U.K. report questions role of ISPs in online safety, 08/10/07: A new report on Internet safety has concluded ISPs should take more responsibility for online security since end users are often lax. Bug bounty program answers critics, 08/09/07: The man who launched both of the security industry's major bug bounty programs Thursday defended the idea of paying for vulnerabilities, but also said he has responded to critics by putting a tighter lid on bug details to make sure they don't fall into the wrong hands. Apple patches Mac Pro, iMac software, 08/09/07: Apple has shipped software updates for its newly-introduced iMac and for its pro-grade desktop, the Mac Pro. Tyson Kopczynski blog: The mystery of certificate roaming: Using PKI with Active Directory always creates the same dilemma. How much space does it require as it grows? This Microsoft Subnet solves the mystery. What's the best bargain on enterprise network products you've ever gotten? |
| Contact the author: Senior Editor Ellen Messmer covers security for Network World. E-mail Ellen. BONUS FEATUREIT PRODUCT RESEARCH AT YOUR FINGERTIPS Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details. PRINT SUBSCRIPTIONS AVAILABLE International subscribers, click here. SUBSCRIPTION SERVICESTo subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here. This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription. Advertising information: Write to Associate Publisher Online Susan Cardoza Network World, Inc., 118 Turnpike Road, Southborough, MA 01772 Copyright Network World, Inc., 2007 |
No comments:
Post a Comment