Friday, July 01, 2011

Malicious activity alert: Anonymous hack-school grads come online in 30 days

Despite controversy, federal, state wiretaps on the rise | Traditional host-based anti-virus software losing luster?

Network World Security

Forward this to a Friend >>>


Malicious activity alert: Anonymous hack-school grads come online in 30 days
In about a month the first graduates of the new Anonymous hacking school could start having an impact on the frequency of cybercrime. "You could have a quarter of a million people who could be educated on how to hack, not professionally, but enough to be significant," says Karim Hijazi, CEO of security start-up Unveillance. He bases that projected impact on the number of followers that the hacking group LulzSec acquired on Twitter during its 50-day spree - 285,550. When LulzSec disbanded last week, its members announced formation of the school. Read More


WHITE PAPER: Riverbed

Case Study: Boston College
Read this case study to learn how Boston College has reduced complexity of the backup process for over 1,700 seats by centralizing management. Read now

WHITE PAPER: IBM

Leveraging security from the Cloud
Cloud computing is a flexible, cost-effective and proven deliv-ery platform for providing business or consumer IT services over the Internet. This whitepaper discusses the who, what, when, why and how of cloud-based security services. Read Now

Despite controversy, federal, state wiretaps on the rise
While their over-use is controversial federal and state requests for court permission to intercept or wiretap electronic communications increased 34% in 2010 over 2009 with California, New York, and New Jersey accounting for 68% of all wire taps approved by state judges. Read More

Traditional host-based anti-virus software losing luster?
Traditional host-based anti-malware packages just aren't that useful anymore, according to some companies that find it either doesn't protect against the main dangers they face from the Web or it simply doesn't run well in virtualized computer environments. Read More

Apathy, law enforcement complications keep cybercrime hopping
General public apathy and collaboration with the law enforcement community assure that cybercrimes of all sorts will continue to rise. Read More


WHITE PAPER: Aerohive

A Practical approach to Wireless 2.0
Creating "Wi-Fi that works" is a tall order given the breadth of client and application types, the speed and complexity of 802.11n, high-density environments, etc., controller-based vendors cannot live up to their promises of Ethernet-like determinism. Read now!

Worm hits popular Chinese Twitter-like service
A popular Twitter-like service in China with 140 million users was hit by a worm earlier this week that resembles past attacks that infected Twitter and MySpace, according to a security analyst. Read More

E-Verify needs to be improved, Obama says
The Internet-based E-Verify employment eligibility system can be an important enforcement tool in the fight against illegal immigration, but only if it can be made error-free and reliable, President Obama said on Wednesday. Read More

Al-Qaida communications knocked offline, says expert
Terror group al-Qaida has been left without a trusted operational channel on the Internet for distributing its media and propaganda, according to a terrorism expert. Read More


WHITE PAPER: EMC

The Changing Role of Network Management
Read how new challenges in IT like virtualization and cloud computing are changing the role of Network Managers, who are now required to leverage automation and integrated solutions even further to adapt to these changes. Learn how EMC Ionix Network Solutions help Network Managers overcome these challenges. Read now

Microsoft clarifies MBR rootkit removal advice
Microsoft has clarified the advice it gave users whose Windows PCs are infected with a new, sophisticated rootkit that buries itself on the hard drive's boot sector. Read More

Abine updates Firefox add-on to block Web tracking
Abine, a company that specializes in Web privacy, has upgraded a Firefox extension that can more precisely block ad networks and websites from tracking users' behavior. Read More

Researcher: Threats from zero-day exploits overhyped
Computers lacking patches for long-known vulnerabilities potentially face more of a hacking risk than from zero-day exploits, or attacks targeting vulnerabilities that haven't been publicly disclosed, according to new research from Secunia. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Microsoft Subnet: A set of classes for a Microsoft Cert from Webucator and Polycom videoconferencing system. Enter here.

SLIDESHOWS

12 of the slickest designs in enterprise tech gear available today
Consumer devices tend to get all the praise for their designs, but there's plenty of cool equipment to be found in the enterprise market. When hardware vendors tag-team with renowned industrial designers, the results can be impressive. Here are some of our favorites.

MOST-READ STORIES

  1. Tablet deathmatch: HP TouchPad vs. Apple iPad2
  2. 10 compelling apps for Cisco Cius
  3. The best 2011 Windows 7 laptops for work and play
  4. Inventor of SecurID token has new authentication system
  5. IBM takes dim view of EU claims
  6. At $750, Cisco Cius Android tablet priced more than an iPad
  7. Apple offers refunds for unhappy Final Cut Pro X customers
  8. What Microsoft paid The Stones to help launch Windows 95
  9. 9 gigantic bonuses that make yours look like chump change
  10. Buying a Linux machine -- Where to shop?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment