Search This Blog

Tuesday, March 29, 2011

McAfee's website full of security holes, researcher says

No Conspiracy Theory Needed: Tor Created for U.S. Gov't Spying | Should smartphones be allowed in the courthouse?

Network World Security

Forward this to a Friend >>>


McAfee's website full of security holes, researcher says
The McAfee.com website is full of security mistakes that could lead to cross-site scripting and other attacks, researchers said in a post on the Full Disclosure site on Monday. The holes with the site were found by the YGN Ethical Hacker Group, and reported to McAfee on Feb. 10, YGN says, before they were publicly disclosed to the security/hacking mailing list. Read More


WHITE PAPER: CA

Total Economic Impact of CA Identity Manager
This Forrester Consulting research demonstrates that companies using CA Identity Manager reduced the time to perform user provisioning, converted 60% of password resets to user self-service, and reduced security risks. Read Forrester's analysis of the total economic impact and rapid ROI of CA IM. Learn More

WHITE PAPER: IBM

Decisions That Drive Success
Read this white paper to learn how decision management makes it possible to use predictive analytics an integral part of real-time decision process including: the different types of decisions and which ones are right for automation; how decision management solutions work; and how to implement a decision management solution at your organization. Read Now

No Conspiracy Theory Needed: Tor Created for U.S. Gov't Spying
There is an interesting post on Cryptome, TOR Made for USG Open Source Spying Says Maker, in which one of Tor's creators, Michael Reed, says to look at why the government created Tor from a common sense point-of-view instead of as conspiracy theory. Read More

Should smartphones be allowed in the courthouse?
Federal courts have been debating about how much freedom users of smartphones and portable wireless devices in general, should have in a federal courthouse.    Read More


WHITE PAPER: Bit9

Retail Grocery Chain
To keep costs in line, this supermarket chain is conscious about extracting the most out of its IT investments while at the same time providing superior protection of its customer data. Read now

New method finds botnets that hide behind changing domains
Researchers at Texas A&M University believe they have a new way of fighting domain-fluxing botnets Read More

Two-thirds OK with hosting games on company gear: survey
Granted, we're talking about an online survey of self-selected participants, but more than a thousand people responded to our poll about the propriety of hosting private video games on company equipment, and a solid majority – about 65% -- said they are OK with the practice. You can details here. The survey was run in conjunction with last week's story headlined: "On the company... Read More


WHITE PAPER: CA

CIOs Feel the Pressure to Optimize the Online Experience
In this exclusive survey, CIOs weigh in on the business impact of application performance. This white paper presents the survey results and offers guidance on building a business case to optimize the customer experience with consistently excellent application performance. Learn More

Cybercriminals selling exploit-as-a-service kit
Cybercriminals are taking a page from the software-as-a-service playbook: they're now selling exploit kits complete with hosting services, with customers paying for the length of time the exploits are actively infecting computers. Read More

Intellectual goods increasingly targeted, report says
Need security to protect your data? A survey of 1,000 security practitioners by McAfee and SAIC says yes, but details on IP cybercrime are few. Read More

Anti-Virus Software Driving You Mad? 5 Fight-Back Tips
Last week some Windows users struggled through unexpected PC slowdowns due to a security program bundled in with a Java update. Security programs still hog PC resources and pose annoyances -- but here's expert advice on how you can regain control. Read More

Companies pick and choose which data breaches to report
One in 7 information technology companies have not reported data breaches or losses to outside government agencies, authorities or stockholders. Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a Windows 7 Enterprise Technician class for three people. From Cisco Subnet: 15 copies of VMware ESXi books. Enter here.

SLIDESHOWS

Hot technology at the annual CTIA wireless show
CTIA Wireless offers a look at the evolving mobile landscape, from handsets and apps to core network systems. Here's a few of the things that are hot at the show in Orlando.

First look at Firefox 4
Firefox 4 has finally arrived, after months of delays and after rival Web browsers Internet Explorer 9 and Chrome 10 already shipped. The browser gets a speed boost and several feature enhancements that are so significant that they all have their own proper names, like Panorama, JaegerMonkey and Firefox Sync. Were they worth the wait? Let's take a look.

MOST-READ STORIES

  1. Paul Baran, Internet and packet switching pioneer, is mourned
  2. Microsoft scheme sniffs out unused wireless spectrum
  3. How Apple played hard to get and seduced the enterprise
  4. Apple holding out on iOS 5 until fall?
  5. Microsoft pays Nortel $7.5 million for IPv4 addresses
  6. AT&T-T-Mobile merger widely panned
  7. Nokia looks to make Windows Phone 7 hottest mobile OS
  8. Update Java and you may get annoying McAfee scanner too
  9. Is Skype a security risk that endangers your privacy?
  10. The RSA Hack FAQ

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: