Friday, March 11, 2011

Pwn2Own 2011: Hackers Shame Safari and IE8 on Day One

Symantec finds fake Google Android update | NASA eyes prototype system to control drones in national airspace

Network World Security

Forward this to a Friend >>>


Pwn2Own 2011: Hackers Shame Safari and IE8 on Day One
The big surprise is not that IE8 or Safari were shamed, it's that no one tried to topple Chrome and Google's offer to pay an additional $20,000 to the first hacker to crack that browser.Well it's March and time for the fifth annual Pwn2Own hacker challenge at CanSecWest security conference. The big surprise is not that IE8 or Safari were shamed on day one, it's that no one took on Chrome and Google's offer to pay an additional $20,000 to the first hacker to crack that browser. Read More


ARTICLE: BMC

Sun Chemical Manages Complex Batch
See how the world's largest producer of printing inks and pigments, Sun Chemical Corporation, uses the advanced enterprise scheduling capabilities of BMC Control-M to keep complex business-critical batch processes running effortlessly. Sun IT lead: "Without it, we would need at least three times the number of people in our team." Learn More Now!

WHITE PAPER: Ultrium LTO

Tape Fallacies Exposed
Misinformation about tape storage abounds. Most strewn about by a few disk-only proponents. Tape storage continues to play a vital role for data protection. David Hill of the Mesabi Group sheds light on the most common misperceptions. Read now

Symantec finds fake Google Android update
Google's latest update for its Android mobile OS appears to already have been subverted by hackers, according to the security vendor Symantec. Read More

NASA eyes prototype system to control drones in national airspace
NASA envisions partnering to build a command/control system for unmanned aircraftOne of the chief technological reasons there aren't more unmanned aircraft in our national airspace is their lack of serious sensing, command and control capabilities.  NASA wants to help change that. Read More

Researchers warn browser users over new SpyEye/ZeuS trojan
SpyEye/ZeuS trojan that targets online banking users turns into a hydra of new variants Security researchers have been nervously awaiting for new versions of SpyEye, a browser Trojan that targets online banking. Now one says it has found a new variant affecting Europe, but fully capable of infiltrating U.S. online banking users as well. SpyEye was a "competitor" to another insidious banking Trojan called ZeuS. Late last year, scuttlebutt was that the creators of SpyEye and ZeuS... Read More

Google's Chrome untouched at Pwn2Own hack match
Google's $20,000 prize went untouched yesterday as no team of hackers at Pwn2Own tried to exploit the Chrome browser. Read More


WEBCAST: Trend Micro

Deep Security with Trend Micro
Watch this video of users of Trend Micro Deep Security and hear how it is ensuring regulatory compliance and preventing server, desktop and cloud data breaches. View now!

Lights, camera, Big Blue: IBM going Hollywood for 100th birthday
IBM brings on Hollywood directors to tell its story as it turns 100IBM wants to see itself through the fisheye lens as it turns 100.  The company today said a few well-known Hollywood directors have shot a series of three movies that highlight the company, its inventions and impact on society over the past 100 years. Read More

Watch out CISOs and CSOs: Chief Risk Officers may be gaining on you
CSOs and CISOs may feel more pressure from a new breed of security professional - the chief information risk officer - now that the federal government has made risk management mandatory and spelled out in a new document just how risk ought to be assessed and dealt with. Read More

Apple patches 62 bugs in massive Safari update
Apple today patched a record 62 vulnerabilities in Safari 5, updating the Mac and Windows browser to version 5.0.4. Read More

Are IT Vendors Getting A "Free Pass" On Security?
Technology industry won't emphasize security until there is a market or regulatory pushI gave a presentation on cyber supply chain security at a Mitre Software Assurance conference last week. One of the things I highlighted was that many organizations are not doing an adequate level of security due diligence on their IT vendors. This fact is clearly illustrated in a few ESG Research data points from the recent report, "Assessing Cyber Supply Chain Security Vulnerabilities Within the... Read More


WHITE PAPER: CA

Minimize the Risk of Negative Business Impacts
A lack of centralized visibility within the IT infrastructure means a single problem spawns multiple alarms to several teams and the underlying root cause may go undetected for too long. CA technologies enable IT to better manage quality of service and transform into a more proactive organization. Learn More

Most IPv6-certified home network gear is frightfully buggy
The University of New Hampshire InterOperability Lab held an IPv6 consumer electronics Plugfest a couple of weeks ago and CableLabs has scheduled two more for this year. The Lab is tight-lipped about the results, but the sad fact is that most home routers and DSL/cable modems certified as IPv6-compliant by the IPv6 Forum are so full of implementation bugs that they can't be used by ISPs for IPv6... Read More

8 essential Android security apps
A DIY guide to securing Android-based devices Read More

Flip Floppers: When Tech Execs Contradict Themselves
Doing an about-face on key issues: It's not just for politicians anymore. Tech honchos like Ellison, Schmidt and Ballmer do it from time to time -- even the mighty Steve Jobs is guilty. Read More

5 women leaders who are shaping IT
There's no better time than International Women's Day to recognize and celebrate the tech industry's key female participants. Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a Windows 7 Enterprise Technician class for three people. From Cisco Subnet: 15 copies of VMware ESXi books. Enter here.

SLIDESHOWS

Perks drive up pay for tech CEOs
Many tech vendors have shied away from extravagant perks, but there are still plenty worth highlighting. Like a $1.5 million tab for home security. Or how about the $36,619 one company paid to reimburse its CEO for the taxes he had to pay on the $106,589 he gained by using company aircraft for personal flights? Read on to find out which tech CEOs enjoyed the priciest perks in 2010 and which ones went to work perk-free.

First look at Google Chrome 10
Google has released the stable version of Chrome 10 and users are now being automatically updated. As always, Chrome's new features focus on security, speed and simplicity, with greater JavaScript performance, sandboxing technology for Adobe Flash, password encryption and an easier-to-use settings interface. Here's a look at the new features.

MOST-READ STORIES

  1. Researchers develop more powerful biofuel alternative
  2. Google still scrambling to recover from DroidDream Android attack
  3. Ex-Microsoft CTO publishes groundbreaking cookbook
  4. If you had bought 100 shares of Microsoft 25 years ago ...
  5. Harvard computer scientist Leslie Valiant wins Turing Award
  6. The eight most important commands on Cisco ASA security appliance
  7. VMware unleashes virtual desktops for Apple iPad
  8. Microsoft pushes more Kinect-like user interfaces
  9. Botnets, cloud computing power may be fueling attacks against VoIP
  10. Most Android, iPhone apps violate open source rules

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment