Search This Blog

Tuesday, January 25, 2011

Top 10 Web hacking techniques of 2010 revealed

Mozilla to offer new feature for improved online privacy | Digital black market offers cheap botnets for hire

Network World Security

Forward this to a Friend >>>


Top 10 Web hacking techniques of 2010 revealed
A Web hack that can endanger online banking transactions is ranked the No. 1 new Web hacking technique for 2010 in a top 10 list selected by a panel of experts and open voting. Read More


WHITE PAPER: ParAccel

Stop Fraudulent Transactions
Learn how creative, iterative analysis detects and halts fraud in minutes, rather than hours or days by leveraging: • Massively Parallel Processing • Columnar database for faster responses • Schema-neutral, no tuning required • Built-in compression and encryption Read now!

WHITE PAPER: Tripwire

Where Compliance and Data Protection Overlap
Data breach detection takes too long. Often it is not a single event, but a series of minor events that combine to enable a major breach. This paper discusses the need for immediate detection and the ability to intelligently and automatically analyze the millions of changes and events as they occur in the infrastructure. Read More!

Mozilla to offer new feature for improved online privacy
Mozilla, the developer of the Firefox browser, is working a feature that will allow users to opt-out of online behavioral advertising. Read More

Digital black market offers cheap botnets for hire
Botnets for hire to launch your own spam campaign and stolen credit card information sold at the rock bottom price of $2 are just two of the commodities easily found on the cyber-crime black market today, according to a report released this month by Panda Security. The report, which was conducted by PandaLabs researchers who posed as cyber criminals, details a vast criminal network selling stolen bank account information in forums and dedicated online stores. Read More


WEBCAST: F5 Networks

DNSSEC: Compliance is Easier Than You Think
Within minutes you'll be brought up to speed on DNSSEC threats, critical challenges and what your team can do to become compliant. Thanks to F5 and Infoblox, it's now easier than you think. Learn more!

Apple hires Geekonomics expert as global security chief
Apple has reportedly made another high-profile cybersecurity hire, and his advanced degree says it all: Master of Science in Information Warfare and Systems Engineering from the Naval Postgraduate School. Read More

Attention RSA Conference: Let's Not Dwell On Cloud Security!
Focus should include tactical requirements, not just strategy and visionThe 2011 RSA Conference is only 3 weeks away so the entire security industry is gearing up for this annual gathering of paranoid geeks. As an analyst, I've been getting lots of email about what vendors will discuss at the event and I've also spent a bit of time perusing the conference web site. Read More


WHITE PAPER: Websense, Inc.

Bailing Out Your Budget: How to Lower Your TCO
The Websense® TRITON™ solution is a unified content security solution that not only delivers better protection against modern threats but also does so with the lowest total cost of ownership (TCO). Read More

Jack Bauer Culture: Torture by "patriots" for national security
The television series 24 ran for eight seasons, but will America ever recover from a "Jack Bauer Culture" where acts of torture are "acceptable" methods in the War on Terror? While I realize that this post is somewhat off-topic in a blog about technology security and privacy, I read an interesting paper that started me thinking about it. The television series 24 ran for eight seasons, but will America ever recover from a "Jack Bauer Culture" where acts of torture are "acceptable" methods in the War on Terror? Recent research shows that many people are OK with torture in... Read More

How you could be collateral damage of 'hacktivism'
If you're in the same cloud as a hack target, you could be hit, tooEarlier this week, I wrote about how computer security expert Hugh Thompson warned that hacktivism is a new security threat to watch for in 2011. The attention drawn to retaliation attacks against sites that cut off funding to the controversial site WikiLeaks.org last year could inspire others to use the same tactic. Read More



BECOME AN INSIDER
Get premium content, in-depth reviews, practical tips and exclusive research. All for just signing up. Sign up for free today.

SLIDESHOWS

12 geekiest snow and ice sculptures
Not all tech weenies hunker down indoors when the snow starts piling up and the ice coats the streets. Some put on their mittens and boots and go to work creating fantastic snow and ice sculptures celebrating their tech favorites.

2011's 25 Geekiest 25th Anniversaries
Our fifth annual collection of the year's "geekiest anniversaries" kicks off with The Mentor's "Hacker's Manifesto" and includes such memorable characters as Captain Midnight and Ferris Bueller, institutions the likes of the IETF and Spy magazine, and inventions like the Super Soaker and disposable camera.

MOST-READ STORIES

  1. Gartner slams Cisco's single-vendor network vision
  2. Is retaliation the answer to cyber attacks?
  3. Three more Microsoft executives jump ship
  4. 90% of Microsoft customers in China using pirated software
  5. Cisco: Puppy cams threaten Internet
  6. The case of Apple's mystery screw
  7. Got $500? You can buy a hacked U.S. military Web site
  8. Apple App Store hits magical 10 billion app download milestone
  9. Is Apple expanding use of tamper-resistant screw for iPhone?
  10. Yahoo IPv6 upgrade could shut out 1 million Internet users

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: