Search This Blog

Monday, September 14, 2009

Steganography meets VoIP in hacker world

Sears forced to destroy spyware-gathered information; Apple fixes Flash snafu in Snow Leopard, patches 33 bugs in Leopard
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile


Sponsored by Trend Micro
rule

Addressing Web Threats
Recent research among senior IT managers reveals that, although organizations are taking steps to protect against Web-related threats to the enterprise, significant vulnerabilities still exist. This white paper provides specific considerations for addressing Web security liabilities.

Read More

rule

Spotlight Story
Steganography meets VoIP in hacker world

Researchers and hackers are developing tools to execute a new data-leak threat: sneaking proprietary information out of networks by hiding it within VoIP traffic. Read full story

Related News:

Sears forced to destroy spyware-gathered information
As part of its final settlement with the Federal Trade Commission, Sears must destroy any consumer information it collected through a downloadable software application the FTC deemed spyware.

Apple fixes Flash snafu in Snow Leopard, patches 33 bugs in Leopard
Less than two weeks after Apple launched Snow Leopard, the company today issued the new operating system's first security update. In a separate upgrade, Apple patched 33 vulnerabilities in 2007's Leopard, and about half as many in the even older Tiger.

Top 10 cool satellite projects
Whether they are monitoring the movement of Great White sharks swimming off the coast of Massachusetts or looking for asteroids streaking towards Earth, satellites are, by their very definition, cool. Here we take a look at some of the most recent technology advances and deployments in recent months.

Faster, more affordable satellite communications spark new services
CIOs are giving satellite communications a second look, as providers deliver faster, more affordable services and as more government agencies and large corporations focus on keeping networks up and running.

Top 5 best practices for firewall administrators
Summer vacation is over and the busy holiday season is just a few months away -- not just for you, but for hackers as well. They plan to take advantage of your time off and the relaxed holiday atmosphere at Christmas and New Year's. Michael Hamelin, chief security architect at Tufin Technologies, says don't let your guard down. He provides his top 5 best practices for managing your firewall.

How much are you worth on the black market?
Ever wondered how much your online identity is worth to a cybercriminal? A new tool from Symantec Corp. will perform the calculation for you.

Five Things You Need to Know About Smartphone Security
Smartphones share many of the same risks of laptops and are easier to lose. Ajit Arya, deputy CIO for Arlington County, Va., supports both BlackBerrys and iPhones and is working to tighten its policies for managing them. "We have taken some basic steps," he says. For example, one recommended best practice is to require passwords. So far, the county has told employees they can set passwords but has not tried to enforce it as a requirement, Arya says.

Microsoft Subnet is giving away training from New Horizons and 15 copies of Windows Server 2008 How-To. Cisco Subnet is giving away 15 copies of Interconnecting Data Centers Using VPLS. Google Subnet is hosting many new bloggers (watch for giveaway information soon.) Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


The history of steganography
SteganographyThere is a wealth of methods for creating encrypted messages you can't even tell are there.

Top 10 cool satellite projects
SatellitesSatellites are, by their very definition, cool.

IDC ROI Calculator for IBM Tivoli Netcool
This ROI calculator from IDC will help you quickly and easily understand the average annual benefit that you may be able to achieve using IBM® Tivoli® Netcool®. The tool and underlying calculations and metrics are based on IDC research of 14 IBM Tivoli Netcool implementations.
Read Now


Sophos Security Solution Center
With the threat landscape constantly changing, you need to have comprehensive protection that isn't complicated. With Sophos, you get complete protection for less investment. You get best-in-class threat protection, and data security and compliance that are simple and affordable so you can get more out of your existing security budget. Review timely resources at this Solution Center.
Visit this site today!

 

September 14, 2009

TOP STORIES | MOST DUGG STORIES

  1. Linux driver chief calls out Microsoft over code submission
  2. 'Wiretapping' charges may be the silliest ever recorded
  3. Developer denies software to beat Chinese censors is malicious
  4. Top 10 cool satellite projects
  5. 802.11n demands special considerations
  6. HP puts the net pedal to the metal
  7. How to make yourself layoff-proof
  8. No alternative to Microsoft Office? IBM begs to differ
  9. Verizon protests Avaya's potential Nortel enterprise business buy
  10. The history of steganography

McAfee Email and Web Security Appliance Trial
15% better malware detection rate and 20% better spam and phishing catch rate - simply more effective than other filters. If that sounds like something you need, install a free trial of McAfee Email and Web Security Virtual Appliance behind your existing spam filter and see what real protection offers.
Click here.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: