Search This Blog

Friday, February 12, 2010

Microsoft warns of SSL/TLS vulnerabilities

Note to Cisco: Pick Your Security Battle | Einstein 1 wasn't smart enough, so the government built a sequel

Network World Security Alert

Forward this to a Friend >>>


Microsoft warns of SSL/TLS vulnerabilities
First of all, this isn't just another Microsoft security flaw. Microsoft has filed this with ICASI as a general security vulnerability affecting multiple implementations of TLS and SSL. Moreover, Microsoft has noted it affects every currently supported version of Microsoft operating systems from Windows 2000 to Windows 7 and Server 2008 R2.  Read More


WHITE PAPER: Force10

Three Steps to Saving with Cloud Computing
Discover how cloud computing dynamically streamlines your infrastructure, delivering freely scalable application service levels; dramatic capital and operational cost savings; flexibility and agility without new hardware; and more. Read Now!

WHITE PAPER: Citrix Systems

The Power of Virtualized Web Application Delivery
This white paper discusses how any size organization can tune its Web application delivery services with a virtualized solution that will meet the unique characteristics of each individual application. Read More

Note to Cisco: Pick Your Security Battle
I've written some not too flattering things lately about Cisco. Now I've got nothing against Cisco -- I'm actually quite impressed with it's broad portfolio, M&A strategy, and sales/marketing muscle. Cisco also has a lot of Chutzpah -- taking on Dell, HP, and IBM on next-generation servers wasn't a move you'd see from a risk-averse company. Read More

Einstein 1 wasn't smart enough, so the government built a sequel
Carolyn Duffy Marsan reports that the Department of Homeland Security has created a special intrusion-detection system and will deploy it widely this year. The IDSs are called Einstein 2. The U.S. Computer Emergency Readiness Team (US-CERT) is monitoring them, along with the Einstein 1 appliances. They're finding out just how federal government networks are being attacked. Read More


WHITE PAPER: Palo Alto Networks

A Practical Guide to Web 2.0 Security
This guide to Web 2.0 security is based on analysis of network traffic in over 200 organizations collected over 6 months in 2009. It details how to deploy an effective firewall to handle applications like Skype and Sametime that are capable of transferring files or apps like WebEx that enable desktop sharing. Click here.

Her Majesty's Government demands protection against cell phone theft.
The British government is demanding that the cell phone industry do more to protect subscribers from phone theft. This would be the same government that just days ago proudly unveiled shatterproof pint glasses for use in pubs. Neither of the two methods apparently involves actually fashioning the glasses from plastic. Read More

New technologies aim to stop phone theft fraud
The U.K. government is bringing three new mobile security technologies designed to safeguard stolen phones to next week's Mobile World Congress in hopes that manufacturers will show interest. Read More


WHITE PAPER: Trend Micro

Smarter Protection For the Enterprise
Read this IDC paper for background on today's threat ecosystem with an overview of network security threats, the impact of the threats on enterprises, and the operational challenges faced by IT. Learn more.

Technologies come and go, but managing networks is still about problem-solving
Technologies come and go, but managing networks is still about problem-solving in a changing world, as these IT executives can attest. Read More

Identity fraud climbed 12% last year
Identity fraud struck an estimated 11.1 million adults in the United States last year, according to new data from Javelin Strategy & Research. Read More

Mozilla retracts Firefox add-on malware claim
Mozilla today acknowledged that it had falsely accused a developer of infecting a Firefox add-on with attack code. Read More

IE flaw that lets remote hackers read your hard drive is extra bad for XP users
On Wednesday a security researcher demonstrated a flaw in Internet Explorer at the Black Hat DC conference that could allow a hacker to remotely read files on the victim's local drive. The demonstration prompted a security advisory from Microsoft. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

Massive giveaway from Cisco Subnet: 50 copies of the Cisco Press CCNP Cert Kits kits are up for grabs. Deadline March 31. 15 books on Microsoft PerformancePoint business analytics available, too.

SLIDESHOWS

10 coolest experiments from Google Labs
When you've got thousands of the world's most brilliant engineers spending 20% of their time on whatever takes their fancy, cool software is the result.

7 social SharePoint apps built in a week
Seven startups competed to develop great SharePoint apps in one week.

MOST-READ STORIES

  1. Google to carriers: 'Anything you can do, we can do better'
  2. 10 recession-proof IT skills
  3. Technology 'firsts' that made a president's day
  4. New Russian botnet tries to kill rival
  5. Why your computer sucks
  6. IBM's Jeopardy-playing machine beats human contestants
  7. 10 best IT jobs right now
  8. The technology behind the Vancouver Olympic Games
  9. U.S. Internet security plan revamped
  10. 66 CCIEs drop out of Cisco's cert program

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: