Friday, March 20, 2009

Researcher cracks Mac in 10 seconds; Just-launced IE8 hacked; Hackers penetrating control systems

The networks powering industrial control systems have been breached more than 125 times
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by IBM
rule

IBM Sponsored by IBM(R) Rational(R) AppScan
To improve the security of web applications, it starts by building software securely. IBM Rational AppScan is a suite of Web application vulnerability scanners that include dynamic and static analysis capabilities. Now you can engage more testers earlier in the development cycle. Try it for yourself. Download and evaluation copy of IBM Rational AppScan Developer Edition.

rule

Spotlight Story

Researcher cracks Mac in 10 seconds at PWN2OWN, wins $5K
Charlie Miller, the security researcher who hacked a Mac in two minutes last year at CanSecWest's PWN2OWN contest, improved his time Wednesday by breaking into another Mac in under 10 seconds.
Also: Researcher hacks just-launched IE8
Just hours before Microsoft officially launched the final code for Internet Explorer 8 (IE8), a German researcher yesterday hacked the browser during the PWN2OWN contest to win $5,000 and a Sony Viao laptop.

Related News:

Expert: Hackers penetrating control systems The networks powering industrial control systems have been breached more than 125 times in the past decade, with one resulting in U.S. deaths, a control systems expert said Thursday.

Chinese high-tech spy case inches closer to trial Did software engineer Hanjuan Jin, who worked at Motorola for about eight years, steal thousands of confidential and proprietary technical documents to share with competitor Lemko and the People’s Republic of China?

Brits stuff mobiles with risky ID data The data stored by Brits on their personal mobile phones can be easily used for ID theft purposes, especially because of the minimal security measures they take to guard the data, warned Credant Technologies.

Online organ donor broker charged with wire fraud The operator of Liver4you.org is facing wire fraud charges for an alleged scheme to use the Web site to entice people needing organ transplants to wire tens of thousands of dollars to the Philippines in exchange for nonexistent surgeries, the U.S. Department of Justice said.

What it will take for mobile VoIP to get enterprise-ready Mobile VoIP technology has yet to evolve to the point where users can simply switch on their phones anywhere and expect to connect to a secure IP network. Here's what it will take for that to have a chance of happening.

Protect Your Data With Whole-Disk Encryption In my last post, I talked about some of the tools that claim to recover your stolen laptop. This time I want to review another series of tools that can be useful protection as well: doing whole-disk encryption of your hard drives across your enterprise. The idea that even if your laptop falls into the wrong hands, no one besides yourself will be able to read any of the files stored on it. When you boot your PC, you need to enter a password, otherwise the data in each file is scrambled, and no one else can gain access to your files.

Australia's Web blacklist leaked The secretive Internet filter blacklist held by the communications watchdog ACMA has been leaked, revealing the government has understated the amount of banned Web pages by more than 1,000.

Security management: 3 key considerations What should you ask when buying security information management software?

Enter for a Microsoft training giveaway from New Horizons
New Horizons Computer Training is offering a free Microsoft training course worth up to $2,500 to be given to one lucky Microsoft Subnet reader. Deadline for entry is March 31.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Exchange alternatives: Pros & cons
Clear Choice Test: Microsoft Exchange alternativesTesting shows Microsoft's Exchange still tops for features and management hooks.

App to no good
10 iPhone apps that could get you into troubleA look at the top 10 iPhone apps that could get you into trouble.

Sponsored by IBM
rule

IBM Sponsored by IBM(R) Rational(R) AppScan
To improve the security of web applications, it starts by building software securely. IBM Rational AppScan is a suite of Web application vulnerability scanners that include dynamic and static analysis capabilities. Now you can engage more testers earlier in the development cycle. Try it for yourself. Download and evaluation copy of IBM Rational AppScan Developer Edition.

rule

Optimizing Systems Management.
IT professionals will realize lower costs and simplified management with a systems management appliance. Appliance-based systems should include: Comprehensive inventory support, secure application distribution, application usage monitoring and robust reporting. Find out if an appliance-based system is right for your organization today.
Download this whitepaper today.


Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies.
Download this Executive Guide now.

 

03/20/09

Today's most-read stories:

  1. Rootkit to exploit Intel chip flaw to be posted 3/19/09
  2. Tweeted out of a job: "Cisco Fatty" story
  3. IBM + Sun: How a merger would impact IT
  4. IE 8 released, made available on Web
  5. Citigroup CIO Marty Lippert leaves for personal reasons
  6. Google Voice: GrandCentral grows up!
  7. Call of duty: World at War: Nazi Zombies trailer and screens
  8. Computer science major is cool again
  9. Cisco rivals size up UCS with usual reaction: caveat emptor
  10. Flying car takes off on first test flight
  11. Students learn through robot battles


Network World on Twitter: Get our tweets and stay plugged in to networking news


The Need for an Adaptive Threat Management Architecture - Live March 31.
Create a more secure and efficient network. Find out how in this Live Webcast, "The Need for an Adaptive Threat Management Architecture." Join us on Tuesday, March 31, 2009, at 1:00 p.m. ET/10:00 a.m. PT. Get real-world advice from Jon Oltsik, senior analyst at consulting firm Enterprise Strategy Group.
Register today for this Live Webcast.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment