Search This Blog

Tuesday, November 17, 2009

Washington Watch National ID Program in Deep Trouble, as Budget Is Cut 40%

DNS problem linked to DDoS attacks gets worse; Guarding against database anti-forensics
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by Cisco
rule

Transforming the Next Generation Branch Office Experience—Any Service, Anywhere
Transform your branch office experience and deploy services "on demand" as business needs dictate with the new Cisco® Integrated Services Routers Generation 2 (ISR G2) Family. This new architecture meets performance requirements for the next generation of WAN and network services, enables cost-effective delivery of high-definition collaboration at the branch office and provides the secure transition to the next generation of cloud and virtualized network services— while reducing overall operating costs.

Read More Now

rule

Spotlight Story
Washington Watch National ID Program in Deep Trouble, as Budget Is Cut 40%

Funding for the already troubled Real ID program has been cut 40%, amid criticism by privacy advocates and state governors. Read full story

Related News:

DNS problem linked to DDoS attacks gets worse
Internet security experts say that misconfigured DSL and cable modems are worsening a well-known problem with the Internet's DNS (domain name system), making it easier for hackers to launch distributed denial-of-service (DDoS) attacks against their victims.

Guarding against database anti-forensics
Database hacking has gone mainstream and is becoming harder to detect because of the increasingly sophisticated anti-forensic procedures hackers use to cover their tracks.

EU-US accord on SWIFT data hits political snag
Some of Europe's largest countries are backing away from a controversial draft agreement being negotiated with the U.S. that would allow that country's antiterrorism agencies access to the personal financial data of millions of European citizens, it emerged Friday.

Cyber-Ark unveils tool for managing Windows, Unix systems
Cyber-Ark Software introduced a single tool that can manage accounts that have privileged access on both Windows and Unix systems.

GAO: Los Alamos National Lab's cybersecurity lacking
Cybersecurity efforts to protect a leading U.S. nuclear laboratory's classified computer network remain lacking even after a series of security lapses, according to a new report from the U.S. Government Accountability Office.

Flash flaw puts most sites, users at risk, say researchers
Hackers can exploit a flaw in Adobe's Flash to compromise nearly every Web site that allows users to upload content, including Google's Gmail, then launch silent attacks on visitors to those sites, security researchers said today.

Web Site Security Holes Make Case for Protection
Two-thirds of the sites that tend to care most about security still have serious unfixed vulnerabilities, according to an analysis from web security firm WhiteHat Security.

InfoWorld's top 10 emerging enterprise technologies
2009's up-and-coming technologies for business that will have the greatest impact in years to come

November giveaways
Cisco Subnet is giving away free books on VMware vSphere security. Microsoft Subnet is giving away training from New Horizons and free books on Exchange Server 2010. Google Subnet is giving away free books on Android app development. Entry forms can be found on the main contest page. Trivia answers are revealed on each main Subnet page.

Network World on Twitter? You bet we are


Ethernet everywhere!
Ethernet everywhereInside planes, trains, cars and spaceships, Ethernet is a morph master. Here's a look at some of Ethernet's cooler implementations.

7 tools to ease Windows 7 rollout
Windows 7These utilities help you plan, ensure app compatibility and manage images.

ITIC Research Paper: VIPRE Takes Bite out of Bloatware
The remedy to bloatware is a better, more efficient and economical product that is specifically engineered to scan, detect and remove myriad security threats without impacting performance. Read this white paper to learn how a new antivirus technology platform reduces bloat and high resource usage.
Learn More


Secure in 15 - Start with Daily Practices
Get the Secure in 15 toolkit starting with the "15 Minutes Month-at-a-Glance" calendar. McAfee will send you additional tools and tricks to stay protected around the clock.
Click here to learn more.

 

November 17, 2009

MOST-READ STORIES

  1. Cray blows by IBM to regain supercomputing crown
  2. HP's 3Com acquisition: An inside look
  3. Microsoft confirms first Windows 7 zero-day bug
  4. Cisco MARS timeline
  5. What's next for Wi-Fi?
  6. Mobile deathmatch: Motorola Droid vs. iPhone
  7. Cool Yule Tools
  8. How to DDoS a federal wiretap
  9. Priceless! The 25 funniest vintage tech ads
  10. Shifting mobile cost to employees? Think twice

Comprehensive NAC
Read this whitepaper on improving endpoint defense, control and visibility through integrated management and enforcement.
Learn more



EMO Labs: Better Sound Through Innovation at DEMOfall 09

EMO Labs' Invisible Speaker innovation takes People's Choice Award top honors at DEMO conference.
Watch EMO Labs product launch.


 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments: