Search This Blog

Wednesday, April 22, 2009

The FBI as an ethical hacker?; Mozilla patches 12 Firefox bugs; Cisco bolsters security family

FBI's CIPAV spyware makes it harder for bad guys to hide, but there are issues with approach
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Security Smart Newsletter
rule

Save time and effort on security awareness training
The Security Smart quarterly security awareness newsletter grabs your employees' attention by presenting security topics in a dynamic useful way. You'll save money, time and energy while making your organization Security Smart. View sample issues and subscribe today! From the editors at CSO Magazine.

rule

Spotlight Story
The FBI as an ethical hacker?

Scott Bradner By Scott Bradner
More details are emerging about how the FBI engages in hacking and the planting of spyware. Read full story

Related News:

Editor's note: We will be changing how we send out Network World newsletters over the next few weeks. To ensure future delivery of your newsletters, please add nww_newsletters@newsletters.networkworld.com to your e-mail address book or
66.186.127.216 to your white-list file. Thank you.

Mozilla patches 12 Firefox bugs, a third of them critical Mozilla Tuesday patched 12 security vulnerabilities in Firefox 3, just days before it hopes to roll out the newest beta of its next open-source browser, Firefox 3.5.

Cisco bolsters security family Cisco Tuesday announced the Cisco IPS Sensor v. 7.0, adding what it calls "reputation analysis" to augment the signature-based defense of the intrusion-prevention system.

NSA chief doesn't want to do cybersecurity solo The National Security Agency doesn't want sole responsibility for running U.S. cybersecurity, the agency's director said Tuesday.

Researcher wants hacker groups hounded mercilessly Criminal cyber gangs must be harried, hounded and hunted until they're driven out of business, a noted botnet researcher said today as he prepared to pitch a new antimalware strategy later this week at the RSA Conference in San Francisco.

Net security, Windows 7 and Conficker under scrutiny Cross-domain security on the Internet, Windows 7 vulnerabilities and the Conficker worm will be among the topics under scrutiny at the Hack In The Box Security Conference (HITB) held in Dubai this week.

Day One RSA: Scouting Mission Cisco Subnet blogger Jimmy Ray Purser takes you through a first-hand visual tour of RSA 2009 in San Francisco.

EMC, Symantec kick-off security barrage at RSA With the RSA Conference cranking up, EMC’s security division RSA and Symantec rolled out security product releases Tuesday.

Can you cut information security in hard times and survive Although some analysts actually expect security spending to rise this year -- at least as a percentage of total IT spending -- some CIOs are giving serious thought to the once-unthinkable idea of trimming security budgets as businesses look to cut costs during this global recession.

Hackers break into Pentagon's fighter jet project Hackers broke into U.S. Department of Defense computers and downloaded terabytes of data containing design information about the Joint Strike Fighter, a $300 billion stealth fighter currently under development, according to The Wall Street Journal.

Upgraded tool tests SAP security weaknesses Sapyto, a tool to test the security of SAP systems, has been upgraded with new plugins that allow more thorough testing, according to the tool's developer.

Lenovo shows tool to manage encrypted drives PC maker Lenovo hopes to give IT managers a helping hand with encrypted hard drive systems after announcing a new password management tool.

Top Trends: Patch Management Find out how patch-management products work, and what they can do for you, in this Product Guide.

April giveaways galore
Cisco Subnet
and Microsoft Subnet are giving away training courses from Global Knowledge, valued at $2,995 and $3,495, and have copies of three hot books up for grabs: CCVP CIPT2 Quick Reference by Anthony Sequeira, Microsoft Voice Unified Communications by Joe Schurman and Microsoft Office 2007 On Demand by Steve Johnson. Deadline for entries April 30.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Eye-catching gadgets at CTIA
10 eye-catching gadgets at CTIA From WiMAX hotspots to $2,000 cell phones, a look at what caught our attention at CTIA Wireless.

Are you an IT geezer?
Quiz: Are you an IT geezer? (and we mean that in a good way)Sure, the new generation knows Facebook, Android and Twitter. But what about ISDN, SNA and X.25? Take the quiz!

Sponsored by Security Smart Newsletter
rule

Save time and effort on security awareness training
The Security Smart quarterly security awareness newsletter grabs your employees' attention by presenting security topics in a dynamic useful way. You'll save money, time and energy while making your organization Security Smart. View sample issues and subscribe today! From the editors at CSO Magazine.

rule

Cut Campus Network TCO by 50%.
Learn how to reduce your campus networks' TCO by up to 50% without compromising high performance, security or reliability. Juniper Networks shows you how to achieve unparalleled consistency, flexibility and efficiency for the lowest possible TCO.
Click here to register for this Live April 30 Webcast.


EMA: Refining privilege access security.
Close the security gaps in high-privilege access control and authentication by selecting the right security products for the job. This whitepaper, "Resolving the Privilege Management Paradox," details how. EMA outlines how to find products that offer strong shared access management, better control and clear visibility and multifactor authentication.
Click to download.

 

04/22/09

Today's most-read stories:

  1. Apple iPhoneys: The 4G edition
  2. The biggest loser in Oracle-Sun deal: SAP
  3. 100 Gigabit Ethernet: Bridge to Terabit Ethernet
  4. VMware vows to overhaul data center with "cloud operating system"
  5. Why the Oracle/Sun deal is bad news for Microsoft, SQL Server
  6. Buzzblog: Oracle acquires Sun in $7.4B stunner
  7. Oracle-Sun union means tough decisions on ID management
  8. Oracle agrees to buy Sun for $7.4B
  9. Sun's MySQL could thrive under Oracle ownership, analysts say
  10. Six things that could ruin Twitter (and five that won't)
  11. Honda demos motion-assistance devices


Network World on Twitter: Get our tweets and stay plugged in to networking news


Metzler: 2009 Handbook of Application Delivery
Successful IT organizations must know how to make the right application delivery decisions in these tough economic times. This handbook authored by WAN expert Jim Metzler will help guide you.
Download now



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: