Search This Blog

Friday, March 25, 2011

Microsoft warns of hack attempt on Windows Live, Google, Yahoo, Skype, Mozilla

Is EMC/RSA poised to buy NetWitness? | FBI: How to be an expert at the black art of cryptography

Network World Security

Forward this to a Friend >>>


Microsoft warns of hack attempt on Windows Live, Google, Yahoo, Skype, Mozilla
Microsoft issued a warning today that nine fraudulent digital certificates were issued by root certificate authority, Comodo Group. Although the certificates were quickly revoked, their initial release still poses a threat to browser users, including users of Internet Explorer. This is not a security flaw in Microsoft software, the company says, but it released a security update for Windows all... Read More


WHITE PAPER: Polycom

Improve Efficiency with Polycom Solutions
Learn how in order to strengthen cooperation and to improve the distribution of resources and expertise, the universities forming the 'Oslo Fjord Alliance' decided to incorporate a UC solution, with Polycom video conferencing, making their day to day easier, and more efficient. Read now!

WEBCAST: TrendMicro

Encryption in the Public Cloud
Listen in as Bob Bragdon discusses data privacy concerns with Dave Asprey, VP of Cloud Security at Trend Micro. Learn about the sixteen best practices you can implement today to secure your data within public cloud environments. Learn More

Is EMC/RSA poised to buy NetWitness?
Industry rumor is building this week that RSA, the security division of EMC, is poised to acquire NetWitness, a privately-held company whose flagship product is used by U.S. government agencies and in the enterprise to detect and analyze security threats. Read More

FBI: How to be an expert at the black art of cryptography
Breaking written codes is seemingly a black art whose history dates back as long as people could write and wanted to keep secrets.  In the age of supercomputers and all manner of advanced technologies it's hard to imagine much cryptography expertise Read More

Men AND women might both be from Mars
A device being developed by MIT researchers and could fly on a future spaceship to Mars might settle the potentially explosive theory that all life on Earth is descended from organisms that originated on the red planet. Read More


WHITE PAPER: Cymphonix

Anonymous Proxy 2.0: When traditional filtering falls short
Filter avoidance technologies utilize the latest security techniques to bypass content filters. Traditional proxy-based and mirror-port filtering approaches are technologically unable to address the issue. This white paper covers a four-pronged approach to effective anonymous proxy control using Cymphonix. Learn More!

At Microsoft, don't forget your password or your phone gets wiped
Microsoft has famously decided to give Windows Phone 7 devices to all of its 89,000 employees, or at least those who want them.  But it's not all fun and games for Microsoft workers who connect smartphones to corporate systems, whether that's a WP7 device or something else. Read More

Japan earthquake, rare earth mining changes could change landscape for U.S.
Sometimes, when you are so far behind in a particular game of strategy, it's OK to fallback, regroup and slowly reevaluate your plan of attack . Read More

Anonymous draws Congressional attention; battles disgruntled members
When Anonymous attacked HBGary Federal back in January, it set off a chain of events that has spawned widespread fascination, fear, anger and some paranoia among the security industry, government, law firms, Congress and even Anonymous itself. Read More


WHITE PAPER: BMC

SMART, Modular, Cost-Effective Steps to Workload Automation
Companies running legacy job scheduling products suffer from higher costs, inefficient use of resources, and greater IT complexity, according to independent analyst firm Enterprise Management Associates. Read their findings, and see why consolidating on a single, comprehensive workload automation solution is an easy win for IT and the business. Learn More Now!

Expert: Iran might be stealing passwords from citizens to tighten censorship
Iran's apparent theft of valid SSL certificates may be an attempt to trap Iranians who use the Internet to duck the government's restrictions, a security expert says. Read More

Big data to drive a surveillance society
Vendors and users of big data analytics gathered in New York this week to discuss the latest developments in a technology that they say will offer Web users and their customers a far more personalized experience while alleviating the need to throw away useful data. Read More

Delay in disclosing SSL theft put Iranian activists at risk, says researcher
Security company Comodo's decision to delay disclosing the theft of digital certificates put the lives of Iranian activists at risk, a researcher charged. Read More

Fighting Organized Retail Crime: Forget the hype!
Several years ago, after reading an article by former Target Investigation head Chris Nelson, I made it my goal to get hired with their Organized Retail Crime (ORC) Investigation Team for three reasons: direction, innovation and resources. Read More

Facebook Tip: Enable Encryption to Avoid Privacy Glitch
Some Facebook traffic this week took a misguided trip from AT&T servers through China and South Korea, exposing some user data. To protect yourself against such glitches, here's how to enable Facebook's HTTPS feature. Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a Windows 7 Enterprise Technician class for three people. From Cisco Subnet: 15 copies of VMware ESXi books. Enter here.

SLIDESHOWS

Hot technology at the annual CTIA wireless show
CTIA Wireless offers a look at the evolving mobile landscape, from handsets and apps to core network systems. Here's a few of the things that are hot at the show in Orlando.

First look at Firefox 4
Firefox 4 has finally arrived, after months of delays and after rival Web browsers Internet Explorer 9 and Chrome 10 already shipped. The browser gets a speed boost and several feature enhancements that are so significant that they all have their own proper names, like Panorama, JaegerMonkey and Firefox Sync. Were they worth the wait? Let's take a look.

MOST-READ STORIES

  1. Programmer fired for eating pizza
  2. Microsoft now manages iPhone, Android, Windows, Linux
  3. Microsoft warns of hack attempt on Windows Live, Google
  4. Linus Torvalds: Android copyright violation claim is "bogus"
  5. Wireless carriers delay Japan's text-to-give donations
  6. U.S. Patent Office finds Google Doodle dandy
  7. Does RSA SecurID have a U.S. gov't-authorized back door?
  8. Industry split on data center network standards
  9. Microsoft sends traditional cake to Firefox team
  10. Firefox 4 performance lags behind Chrome 10 and IE 9

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: