Search This Blog

Wednesday, August 05, 2009

Twitter now blocking bad URLs, but imperfectly

Payback's a switch for ex-hacker; Hacking the Defcon 2009 badge
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile


Sponsored by Symark
rule

Controlling Access to Privileged Accounts
This white paper explores insider attacks and insider risk, and shows how to control them by controlling and monitoring access. The paper describes the more common vulnerabilities exploited by insider attacks and a method for assessing insider risk.

rule

Spotlight Story
Twitter now blocking bad URLs, but imperfectly

Hoping to deal with a growing problem, Twitter has quietly introduced a feature to prevent users from posting links to malicious Web sites. But security experts say that it can be easily circumvented. Read full story

Related News:

Payback's a switch for ex-hacker
Kevin Mitnick remains a marked man ... and that notoriety has the former hacker occupying a new spot on the Internet after being booted from his previous home. From a story by my Network World colleague Ellen Messmer: "They kicked me off," Mitnick says, noting he doesn't begrudge Hostedhere.net, which he used for five years. But after a number of break-ins that targeted the former hacker, "they decided...

Hacking the Defcon 2009 badge
Hackers modify the Defcon 2009 badge to act as a lie detector, confuse facial recognition systems and get around motion detection systems.

Kevin Mitnick seeks refuge from hackers
Kevin Mitnick, the ex-hacker turned security consultant, is such a high-profile target himself that the Web-hosting firm he was using finally told him it wouldn't host Web pages for him anymore.

Is Your Linksys or Netgear Router Open to Attack?
If you have a Linksys model WRT160N or Netgear RP614v4 router, it may be time to worry a little. At least according to a report out of Defcon from The Register. The vulnerability is based on CSRF, or cross-site request forgery, an issue with the cPanel web-based control software used to administrate the devices.

Defense Department eyes hacker con for new recruits
The U.S. Air Force has found an unlikely source of new recruits: The yearly Defcon hacking conference, which runs Thursday through Sunday in Las Vegas.

August Giveaways
Cisco Subnet is giving away training from Global Knowledge and 15 copies of Practical Intrusion Analysis; Microsoft Subnet is giving away training from Global Knowledge and 15 copies of SCCM 2007 Unleashed. Google Subnet is giving away 15 copies of Web Geek's Guide to Google Chrome. Entry forms can be found on the Cisco Subnet, Microsoft Subnet and Google Subnet home pages. Deadline for entries is August 31.

Network World on Twitter? You bet we are


Black Hat's best
Black HatHow well you remember the Black Hat conference's most notorious incidents?

Wireless burning questions
IT quizHow much longer are you going to hang onto that Ethernet cable? And other questions.

Cisco 2009 Midyear Security Report
The Cisco 2009 Midyear Security Report presents an overview of Cisco security intelligence, highlighting threat information and trends from the first half of 2009. As predicted, this year's threats are more sophisticated and targeted. However, there are encouraging signs that increased collaboration is hindering the development and growth of attacks - and helping to identify criminals.
Get your copy of this report now.


Gaining the Performance Edge Using a Column-Oriented Database Management System
Many organizations are increasingly recognizing the potential benefits of how analytic databases can support reporting, strategic analysis, and other business intelligence activities. Explore the data explosion phenomenon and why column-oriented database systems are able to provide the boost that is needed to gain the performance edge.
Gaining the Performance Edge Using a Column-Oriented Database Management System

 

August 05, 2009

TOP STORIES | MOST DUGG STORIES

  1. When error messages go public
  2. CEOs still getting big perks despite pay backlash
  3. BGP vulnerabilities in Cisco IOS
  4. Kevin Mitnick seeks refuge from hackers
  5. Conficker talk sanitized at Black Hat to protect investigation
  6. Fake ATM doesn't last long at hacker meet
  7. Korean 'journalists' booted from Defcon
  8. Black Hat 2009: How to hack a parking meter
  9. Nine things about botnets that will scare your pants off
  10. Some IT skills hot, even in down economy

Identity Management: complexity made simple
Sun's pragmatic approach to identity management combats complexity with everyday solutions, helping you streamline and simplify the identity infrastructure to reduce costs, tighten security, and mitigate risk. View the Sun Identity Management Solution Center today.
Identity Management: complexity made simple



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: