Search This Blog

Friday, April 01, 2011

Hacker group defies U.S. law, defends exposing McAfee website vulnerabilities

Researchers' SSL offloader costs fraction of commercial hardware | No joy for would-be baby shakers and drunk drivers

Network World Compliance

Forward this to a Friend >>>


Hacker group defies U.S. law, defends exposing McAfee website vulnerabilities
The hacker group that exposed holes in McAfee's website knows it's breaking U.S. law, but vows to continue exposing vulnerabilities, especially on security vendor websites. Read More


WHITE PAPER: Palo Alto Networks

SANS: Enabling Social Networking Apps for Enterprise Usage
This whitepaper, written by a SANS analyst, provides the latest research regarding social networking applications, explains the benefits and risks that they bring to corporate networks, and provides a recommendation for defining a secure social networking policy. Read now!

WHITE PAPER: CA

The 2010 Handbook of Application Delivery
Now is the time for application delivery 2.0. From virtualization to cloud computing, ensuring application performance has become more complicated. This comprehensive handbook provides a state-of-the-market report on best practices to address the new application delivery challenges. Read Now

Researchers' SSL offloader costs fraction of commercial hardware
Off-the-shelf graphic processing units can perform SSL acceleration as fast as high-end commercial SSL hardware at a fraction of the cost, according to researchers in Korea and the U.S. Read More

No joy for would-be baby shakers and drunk drivers
Read More

Man-in-the-Browser attacks target the enterprise
With firewalls, antivirus and other security mechanisms protecting corporate networks, how do attackers manage to penetrate enterprise computer systems? Simply by exploiting the weakest link in the security chain. One of the newest methods is tunnelling in via employees' browsers using an attack known as "Man-in-the-Browser" (MitB). Read More


WHITE PAPER: CA

Catholic Health East Success Story
Using CA Oblicore Guarantee™, CHE has been able to automate the process of SLA reporting, build a service catalog and capture reliable IT service delivery information. The solution pulls information from originating systems to populate reports, dashboards and SLA scorecards based on defined metrics. Learn More

Most approve of hosting games on company gear, survey finds
Only about a third of more than 1,000 respondents to a Network World online survey believe it's always wrong to use company equipment to host private video game sessions for groups of players. Read More

Critical NASA network was open to Internet attack
Six NASA servers exposed to the Internet had critical vulnerabilities that could have endangered Space Shuttle, International Space Station and Hubble Telescope missions -- flaws that would have been found by a security oversight program the agency agreed to last year but hasn't yet implemented, according to a report by the agency's inspector general. Read More

VIPRE maker explains false positive on Samsung laptops, apologizes
The maker of the VIPRE anti-spyware tool is taking responsibility for a false positive that misidentified a legitimate Windows folder on Samsung laptops as a program that secretly logs keystrokes. Read More


WHITE PAPER: Aerohive

Wi-Fi Provides RX for Healthcare Challenges
This paper looks at how healthcare providers are using wireless LANs creatively to improve patient care and to realize much-needed cost efficiencies. Read now!

Comodo hacker claims another certificate authority
The hacker who claimed credit for breaking into systems belonging to digital certificate vendor Comodo said he has compromised another certificate authority, along with two more Comodo partners, a move that could further undermine trust in the system used to secure websites on the Internet. Read More

Companies pick and choose which data breaches to report
One in 7 information technology companies have not reported data breaches or losses to outside government agencies, authorities or stockholders. Read More

Restaurant chain to pay $110,000 to settle breach claims
The Briar Group has agreed to settle claims that it failed to adequately protect credit card data of its customers. Read More

BP employee loses laptop containing data on 13,000 oil spill claimants
The personal information of 13,000 individuals who had filed compensation claims with BP after last years disastrous oil spill may have been potentially compromised after a laptop containing the data was lost by a BP employee. Read More

Behind the curtain of a botnet business
Researchers gain access to one of the world's largest spam botnets, and find it's an operation that as organized and crafty as any successful corporation Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a Windows 7 Enterprise Technician class for three people. From Cisco Subnet: 15 copies of VMware ESXi books. Enter here.

SLIDESHOWS

Tech's youngest billionaires
The nine youngest billionaires in technology run the gamut from a social networking entrepreneur to the creator of the online coupon company, groupon.com. Think you know them all? Let's find out.

No joy for would-be baby shakers and drunk drivers
In this slideshow we'll take a look at some of the most notorious applications that were banned or removed from the big-name app stores.

MOST-READ STORIES

  1. Samsung installs keylogger on its laptop computers
  2. Samsung responds to installation of keylogger on its laptops
  3. FBI wants public help solving encrypted notes
  4. Google building fiber network in Sprint's backyard
  5. Microsoft to raise license price, add software rights
  6. FTC puts Google on 20 years of 'privacy probation'
  7. Cisco data center revamp cuts across switches, servers, storage
  8. Hacker group defends exposing McAfee website vulnerabilities
  9. Dell draws derision for dissing iPad
  10. Microsoft researchers tout programmable prototype switch

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: