Search This Blog

Monday, January 17, 2011

Oracle issuing 66 patches

Decoy networks, separation tactics part of AT&T security chief's infrastructure protection plans | "Stealing Wi-Fi" isn't about Wi-Fi

Network World Security

Forward this to a Friend >>>


Oracle issuing 66 patches
Oracle is planning on Tuesday to release 66 security patches affecting hundreds of products, according to a notice posted on its website. Read More


WHITE PAPER: F5 Networks

Implementing DNSSEC to mitigate financial and brand risks
The problems of DNS security have long been known, which is why DNSSEC was developed. However, it is only now that widespread deployment is possible as the internet infrastructure is being readied to accept DNSSEC lookups and tools are available to remove the complexity involved in its deployment. Read now!

WHITE PAPER: Phone Factor

Combat Online Banking Fraud with Out-of-Band Authentication
Incidents of online banking fraud have risen to unprecedented levels. This whitepaper will look at how these malicious threats affect online banking, customer perceptions about risk and financial responsibility, and the role of out-of-band authentication in protecting against online banking fraud. Learn More

Decoy networks, separation tactics part of AT&T security chief's infrastructure protection plans
As chief security officer at AT&T, Edward Amoroso has long observed how cyberattacks impact customer and service-provider networks. In his newly published book, Amoroso says it's time to unite to create the equivalent of a national cyber-protection shield to guard against attacks on industry and government networks by terrorists, state-sponsored attackers and plain old thieves. Read More

"Stealing Wi-Fi" isn't about Wi-Fi
Helen Rubenstein wants everyone to be neighborlyThe New York Times has an Op-Ed "contribution" from Helen Rubenstein, who fondly reminisces about how, for years, she piggybacked on her neighbors unsecured Wi-Fi connection to tackle her first freelance writing assignments, file her taxes, stream episodes of "Friday Night Lights," and, "speedily reply to student e-mails, video-chat with my sister, keep abreast of the latest literary hoo-ha, 'like'... Read More

NASA appoints new information security chief
NASA named a veteran government IT official to serve as its deputy CIO for Information Technology Security. Read More


WHITE PAPER: Websense, Inc.

Bailing Out Your Budget: How to Lower Your TCO
The Websense® TRITON™ solution is a unified content security solution that not only delivers better protection against modern threats but also does so with the lowest total cost of ownership (TCO). Read More

Maryland man exacts sweet robocall revenge
Have you ever wanted to get some sort of revenge on those automated robocalls that in some cases continue to interrupt dinner or in this situation, sleep? The Washington Post has a story today about a Maryland man who'd had enough and exacted some revenge of his own. Read More

Happy 25th birthday, IETF
The Internet's leading standards body - the Internet Engineering Task Force - turns 25 on Jan. 16. Read More

The 10 biggest hoaxes in Wikipedia's first 10 years
The online encyclopedia that anyone can edit has had its share of hoaxes of the years. Here are the top 10. Read More


WHITE PAPER: PacketMotion

PacketSentry Virtual Segmentation
While firewalls are a widely accepted technology for the Internet perimeter, when deployed internally for PCI scope segmentation they have significant deficiencies. This white paper outlines the issues faced with leveraging firewalls for internal network segmentation, and how PacketSentry bypasses these issues with a unique out of band approach. Read now!

Universities against cyberthreats
Iowa State, USC putting their researchers and students up against growing malware and IT security threatsThe Iowa State Daily is reporting that Iowa State University students are cooking up cyber attacks on a SCADA test bed that will help them learn how to defend against such threats. Defending SCADA (supervisory control and data acquisition) networks -- those used for industrial control systems -- has beena hot topic since the Stuxnet worm struck SCADA networks, in particular those in Iran. Read More

Military aircraft flying to all-fiber network gear
Fiber networks to become standard equipment in military aircraft Looking to significantly reduce weight, improve on-board communications and make it easier to upgrade avionics, the US military is developing prototype phonic gear for use in all aircraft. Read More

DHS puts weight behind USC "mini-Internet" security testbed
The University of Southern California has signed a 5-year, $16 million contract with the Department of Homeland Security to expand USC's DETERlab "mini-Internet" security testbed. Read More



BECOME AN INSIDER
Get premium content, in-depth reviews, practical tips and exclusive research. All for just signing up. Sign up for free today.

SLIDESHOWS

12 geekiest snow and ice sculptures
Not all tech weenies hunker down indoors when the snow starts piling up and the ice coats the streets. Some put on their mittens and boots and go to work creating fantastic snow and ice sculptures celebrating their tech favorites.

2011's 25 Geekiest 25th Anniversaries
Our fifth annual collection of the year's "geekiest anniversaries" kicks off with The Mentor's "Hacker's Manifesto" and includes such memorable characters as Captain Midnight and Ferris Bueller, institutions the likes of the IETF and Spy magazine, and inventions like the Super Soaker and disposable camera.

MOST-READ STORIES

  1. Windows on verge of dropping below 90% market share
  2. Verizon iPhone antenna redesign may thwart 'death grip,' says expert
  3. Facebook, Google, Yahoo commit to 'World IPv6 Day' trial
  4. Apple is professional Linux
  5. Android OS in 2011: 12 developments to keep Apple nervous
  6. Microsoft guy slams "President of the United States of Google"
  7. Google pays record bounty for Chrome bug
  8. Facebook wants to issue your Internet driver's license
  9. Investment firm dumps Cisco stock over human rights issues
  10. Is this a BlackBerry "Dakota" I see before me?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: