Search This Blog

Thursday, August 06, 2009

XML flaw threatens apps built with Sun, Apache, Python and GNOME libraries

Will AI in killer military robots lead to real Terminators?; After links to cybercrime, Latvian ISP is cut off
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile


Sponsored by Symark
rule

Controlling Access to Privileged Accounts
This white paper explores insider attacks and insider risk, and shows how to control them by controlling and monitoring access. The paper describes the more common vulnerabilities exploited by insider attacks and a method for assessing insider risk.

rule

Spotlight Story
XML flaw threatens apps built with Sun, Apache, Python and GNOME libraries

Security vendor Codenomicon has found flaws in XML parsers that enable denial-of-service attacks, corruption of data, and even delivery of a malicious payload. Read full story

Related News:

Will AI in killer military robots lead to real Terminators?
Will intelligent, unmanned airborne and ground-based robotic vehicles equipped with missiles, bombs and guns pose a real threat to the general population in the future?

After links to cybercrime, Latvian ISP is cut off
A Latvian ISP linked to online criminal activity has been cut off from the Internet, following complaints from Internet security researchers.

Case studies in working with law enforcement (Part 1)
Should we work with law enforcement when we encounter security breaches?

Mozilla shuts Firefox e-store after security breach
Mozilla closed its online store late Tuesday after finding out that the firm it hired to run the backend operations of its e-tailing business had suffered a security breach.

Fast-Food FAIL: Drive-Thru Displays Point-of-Sale LAN Info
Rick Lawhorn went to a local fast-food chain one recent evening and found a potential security threat to go with his burger and fries.

August Giveaways
Cisco Subnet is giving away training from Global Knowledge and 15 copies of Practical Intrusion Analysis; Microsoft Subnet is giving away training from Global Knowledge and 15 copies of SCCM 2007 Unleashed. Google Subnet is giving away 15 copies of Web Geek's Guide to Google Chrome. Entry forms can be found on the Cisco Subnet, Microsoft Subnet and Google Subnet home pages. Deadline for entries is August 31.

Network World on Twitter? You bet we are


Black Hat's best
Black HatHow well you remember the Black Hat conference's most notorious incidents?

Wireless burning questions
IT quizHow much longer are you going to hang onto that Ethernet cable? And other questions.

Data in Action: Effective data management for smarter outcomes
Date: August 19, 2009 Exhibit Zone 8:00 am PDT / 11:00 am EDT to 12:00 pm PDT / 3:00pm EDT Join us for a special, complimentary Virtual Conference, offering valuable information for lowering IT costs through industry-leading performance, enhanced storage compression and improved automation.
Data in Action: Effective data management for smarter outcomes


Avoiding Security Breaches
Discover effective tools and strategies for gaining regulatory compliance, avoiding security breaches and enforcing tight security. Learn how to recover from a data breach, the latest in security best practices, how you can achieve compliance while saving money, and more.
Click here to learn more.

 

August 06, 2009

TOP STORIES | MOST DUGG STORIES

  1. Google gives 'Voice' to military personnel
  2. When error messages go public
  3. Windows 7: Four reasons to upgrade, four reasons to stay away
  4. XML flaw threatens apps built with Sun, Apache, Python libraries
  5. Kevin Mitnick seeks refuge from hackers
  6. Employee reviews on Glassdoor.com slam Cisco
  7. Top tech rollercoasters
  8. Verizon slashes smartphone prices
  9. Google thinks BlackBerry is ripe for picking
  10. BGP vulnerabilities in Cisco IOS

Identity Management: complexity made simple
Sun's pragmatic approach to identity management combats complexity with everyday solutions, helping you streamline and simplify the identity infrastructure to reduce costs, tighten security, and mitigate risk. View the Sun Identity Management Solution Center today.
Identity Management: complexity made simple



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: