Security News AlertNetwork World's Security News Alert, 08/09/07Podcast: Why Hackers Love Your Apps, 08/08/07: Custom-made applications are riddled with holes that hackers are discovering with glee. IT departments are spending too much time patching operating systems and not enough time looking for threats in their applications. Jack Danahy from Ounce Labs talks to Jason Meserve about who's responsible and what can be done to shore up custom-code from a hacker attack. Los Alamos nuclear lab loses more data, 08/07/07: The error-prone Los Alamos Nuclear Laboratory has inadvertently released highly classified nuclear weapons material again, this time by e-mail. Blue Pill threat dead? … That's wishful thinking, 08/08/07: Joanna Rutkowska, the renowned rootkit researcher at Invisible Things Lab based in Poland, has ignited keen interest in virtualization-based malware with her creation called Blue Pill. Last year at the Black Hat conference she gave a presentation on Blue Pill, and at last week’s Black Hat 2007, she announced she is making the New Blue Pill, which, among other things, can run tens of Blue Pills inside each other, available for research purposes.
VPNs still show basic flaws, says study, 08/07/07: A penetration test of U.K. corporate VPNs has offered decidedly mixed news on security. Laptop of VeriSign employee stolen, 08/07/07: A laptop containing the personal information of VeriSign's current and former employees was stolen from an employee's car last month, the company confirmed Tuesday. U.C. researchers: Take antispam fight to the Web, 08/07/07: According to researchers at the University of California, San Diego, antispam fighters could really hurt the spammers bottom line, if they target the Web sites used to host their scams rather than simply trying to block the mail server used to send out unsolicited commercial e-mail. Aladdin's eSafe upgraded to halt proxy menace, 08/07/07: Security vendor Aladdin Knowledge Systems has added an element to its eSafe secure Web gateway that it claims can block the operation of 'anonymous' proxies. What's the best bargain on enterprise network products you've ever gotten? |
| Contact the author: Senior Editor Ellen Messmer covers security for Network World. E-mail Ellen. BONUS FEATUREIT PRODUCT RESEARCH AT YOUR FINGERTIPS Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details. PRINT SUBSCRIPTIONS AVAILABLE International subscribers, click here. SUBSCRIPTION SERVICESTo subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here. This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription. Advertising information: Write to Associate Publisher Online Susan Cardoza Network World, Inc., 118 Turnpike Road, Southborough, MA 01772 Copyright Network World, Inc., 2007 |
No comments:
Post a Comment