Search This Blog

Thursday, September 20, 2007

Jobs says Apple will fight iPhone unlocking hacks; Security Buzz: What the experts think

Network World

Security News Alert




Network World's Security News Alert, 09/20/07

Jobs says Apple will fight iPhone unlocking hacks, 09/18/07: Apple CEO Steve Jobs said Tuesday that it's his company's job to stymie hackers who try to unlock the iPhone -- the first time the company has officially said it would fight attempts to use the popular device on unauthorized networks.

Video: Security Buzz: What the experts think: Speakers at The Security Standard conference weigh in on what they feel is the biggest security threat today. Featuring: Whitfield Diffie (Sun), Steve Hanna (Juniper), Scott Weiss (IronPort) and Richard Palmer (Cisco).

Data-loss prevention tools on tap from Orchestria, 09/19/07: Orchestria on Wednesday announced its foray into the data-loss prevention market with a hardware and software package designed to help companies prevent sensitive data and intellectual property from leaving the organization without authorization

Comprehensive Network Access Control

The new wave of sophisticated crimeware not only targets specific companies, but it also targets desktops and laptops as backdoor entryways into business operations and resources. Network access control enables proper configuration and security of user endpoints before they are allowed access on the corporate network.
Click here to download this whitepaper.

Fear of insider threats hits home, 09/19/07: The more money that companies spend on securing their IT operations from external attack, the more it seems they become aware that the potential threat posed by their own employees remains their most significant risk.

Obsolete WEP Wi-Fi gets new security shield , 09/19/07: Wi-Fi security vendors are releasing new products to protect customers against weaknesses in the WEP encryption scheme, even though it has been obsolete for years.

Privacy groups: Google's call for standard not enough, 09/17/07: The U.S. government still needs to block or impose conditions on Google's acquisition of online advertising server DoubleClick, despite Google's call for global privacy standards, three privacy groups said Monday.

BigFix announces endpoint-security offering, 09/18/07: Management software maker BigFix on Tuesday announced a new endpoint-protection offering.

Bit9 upgrades endpoint-security offering, 09/18/07: Bit9 on Tuesday announced an upgrade to its endpoint-protection software that implements automatic whitelisting of approved applications and devices.

Enterasys upgrades NAC to handle guest devices, 09/18/07: Enterasys is issuing a new version of its NetSight management suite that lets its NAC system set policies for unmanaged devices such as guest laptops.

Using SAN-enabled certificates for OCS and unified messaging: Microsoft Subnet blogger Alex Lewis says, “There seems to be a limited understanding of certificates that allow Subject Alternative Names.” These allow “a single cert-set for Exchange, OCS and all unified messaging.”

Buzzblog: Security pro warned Ameritrade about leak way back in Jan. '06: In other words, it started much earlier and went on much longer than has been reported. An IT security pro has e-mails showing he warned Ameritrade repeatedly in Jan. '06 that customer data had been compromised. His missives were met with assurances that such couldn't be the case. It was, but 6.2 million clients didn't find out until last Friday.

Chat with Amazon.com’s CTO live
If ever there were a man that knew how to eek out capacity and secure a data center, it would be Werner Vogels, vice president & CTO of Amazon.com. Join him for a live chat on Monday Oct. 1 from 2 p.m. - 3 p.m. EDT.

TODAY'S MOST-READ STORIES:

1. IBM targets Office with free productivity apps
2. Sprint launches home cells to boost signals
3. One less reason to adopt IPv6?
4. The Hell of Gateway's tech support
5. Cisco to buy wireless-management firm Cognio
6. Researchers flash personal aircraft, future jetpack
7. DST issues resurface for IT
8. A Nortel-3Com-Polycom combo vs. Cisco
9. Does 802.11n spell the end of Ethernet?
10. 10 IT management software companies to watch

MOST-READ REVIEW:
VM management tools tested


Contact the author:

Senior Editor Ellen Messmer covers security for Network World. E-mail Ellen.



BONUS FEATURE

IT PRODUCT RESEARCH AT YOUR FINGERTIPS

Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details.


PRINT SUBSCRIPTIONS AVAILABLE
You've got the technology snapshot of your choice delivered to your inbox each day. Extend your knowledge with a print subscription to the Network World newsweekly, Apply here today.

International subscribers, click here.


SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription.


Advertising information: Write to Associate Publisher Online Susan Cardoza

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772

Copyright Network World, Inc., 2007

No comments: