Everything related to Computer Security - Security Audits, Security Vulnerabilities, Intrusion Detection, Incident Handling, Forensics and Investigation, Information Security Policies, and a whole lot more.
Search This Blog
Tuesday, August 25, 2009
Cisco wireless LAN vulnerability could open 'back door'; Personal spy gear: Is it ethical? Is it legal?
News podcast: Network World 360; Personal spy gear: Is it ethical? Is it legal?
Some wireless access points from Cisco Systems have a vulnerability that could allow a hacker to redirect traffic outside the enterprise or potentially gain access to an entire corporate network, a security company said. Read full story
News podcast: Network World 360 A security company said today that some wireless access points from Cisco have a vulnerability that could let hackers redirect traffic outside the enterprise, or potentially gain access to an entire corporate network. Also, Twitter is jumping on the geolocation bandwagon, with plans to let users geocode their posts and make the information accessible both on the main Twitter site and through external applications. (5:41)
More smartphones than PCs by 2011 Smartphone sales will surpass worldwide PC sales by the end of 2011, says a new report. The report, by RBC analyst Mike Abramsky, estimates that by that time shipments of both will be approaching 400 million a year.
How to control your SAN Ron talks with Rick Clark, CEO of Aptare, about the challenges of SANs growing at an exponential rate while the funding to manage them doesn't keep pace. Clark discusses how to deal with file deduplication, remote backup of SANs and a few other topics of interest for those dealing one or more SANs in their data center. (27:04)
Snow Leopard, More Snore Than Snarl There is little reason for most users to upgrade to Apple's next-generation Snow Leopard operating system this Friday, but at least the price is reasonable. Or is it?
Rackspace debuts 'Cloud Tools' portal Cloud infrastructure provider Rackspace on Tuesday announced a new portal that will help showcase and organize tools and applications built by its partners and independent developers.
10 reasons you shouldn't believe in UFOs Former Arizona Gov. Fife Symington and his band of others are out beating the drums so loudly about UFOs that they might be heard on another planet. I just watched this Larry King interview ... and the stories these men tell are remarkable; just not remarkable enough to convert me from a lifelong skeptic into a believer.
August Giveaways Cisco Subnet is giving away training from Global Knowledge and 15 copies of Practical Intrusion Analysis; Microsoft Subnet is giving away training from Global Knowledge and 15 copies of SCCM 2007 Unleashed. Google Subnet is giving away 15 copies of Web Geek's Guide to Google Chrome. Entry forms can be found on the Cisco Subnet, Microsoft Subnet and Google Subnet home pages. Deadline for entries is August 31.
Independent Test Results: Citrix vs. F5 Latency is an important metric when measuring Web applications. See the benchmark results from independent tester, Tolly, to learn how Citrix fared against F5 in a wide range of scenarios. Learn More
IBM ISS X-Force Threat and Risk Report Read this Trend and Risk report from IBM® ISS X-Force® to learn statistical information about all aspects of threats that affect Internet security, including software vulnerabilities and public exploitation, malware, spam, phishing, web-based threats, and general cyber criminal activity. Read Now
The Top Five Ways IT Organizations Can Help Companies Survive a Tough Economy When times are tough, companies need to home in on those activities that help them operate more efficiently and do more with less. They need to quickly adapt and respond to competitive threats and fluctuating market conditions. They need to seize the opportunities that will help them survive the down cycle and emerge stronger than before. This white paper discusses the five key initiatives that companies will be focused on over the next 12 to 24 months. Learn more.