Thursday, August 11, 2011

Defcon: VoIP makes a good platform for controlling botnets

Microsoft patches 1990s-era 'Ping of Death' | Guilty plea from one man identity theft operation that netted $770,000

Network World Security

Forward this to a Friend >>>


Defcon: VoIP makes a good platform for controlling botnets
Botnets and their masters can communicate with each other by calling into the same VoIP conference call and swapping data using touch tones, researchers demonstrated at Defcon. Read More


WHITE PAPER: CA Technologies

Ponemon: Security of Cloud Computing Providers
This report offers the cloud providers beliefs on the state of cloud security. In addition, it compares the findings from both reports, determining similarities and discrepancies between cloud computing users and providers. Learn More

WHITE PAPER: F5

Virtual Clustered Multiprocessing (vCMP)
Virtual Clustered Multiprocessing (vCMP), the industry's first purpose-built hypervisor, completes this functionality by allowing administrators to completely segment those resources into independent, virtual ADCs. Read Now!

Microsoft patches 1990s-era 'Ping of Death'
Microsoft today issued 13 security updates that patched 22 vulnerabilities in Internet Explorer, Windows, Office and other software, including one that harked back two decades to something dubbed "Ping of Death." Read More

Guilty plea from one man identity theft operation that netted $770,000
The US Department of Justice said a man who rang up 4,400 fraudulent charges totaling $770,674 from 2,341 stolen credit pleaded guilty today in the District Court in Alexandria, Va. Read More

Microsoft's BlueHat goal: Kill bugs dead
Microsoft has eschewed paying for one-off bug bounties, switches focus to fixing entire classes of flaws instead. Read More


WHITE PAPER: Dell

Security: A Multilayered Approach
The resources in this Security KnowledgeVault provide expert advice on everything from creating a multilayered security strategy and deploying a more proactive fight against cybercrime, to realizing when it's time to stop going it alone and seek outside, expert help. Learn more.

USB devices: The big hole in network security
USB devices may be important tools foir business but they have security issues Read More

Anonymous Allegedly Threatens to 'kill' Facebook
The hacking group Anonymous is allegedly threatening to "destroy" Facebook on Nov. 5, accusing the social networking site of spying on users, cooperating with authoritarian governments and abusing people's privacy. Read More

China Hit By 480,000 Trojan Horse Attacks in 2010
China said it saw close to 480,000 Trojan horse attacks in 2010, with almost half originating from outside the country, according to a government security agency. Read More


WHITE PAPER: Citrix Systems

Technical Whitepaper: Open Cloud Access
Learn how to provide single sign-on for ALL of your apps and users in your cloud environments. Free guide shows how OpenCloud Access, provided by Citrix NetScaler, turns identity management into a centrally-based network function that is simple, scalable, and cost-effective. Get your copy today -- compliments of Citrix. Read now!

Vulnerable Insulin Pumps Demostrate Pervasive Risks
I was catching up on the news from the DefCon security event in Las Vegas when one particular story caught my eye. A security researcher named Jay Radcliffe, a diabetic, discovered that he could hack his own Insulin pump and prompt the device to deliver either too much or too little Insulin. By exploiting this vulnerability, a hacker could literally use technologies like wireless networking to commit... Read More

When a Cloud Service Vanishes: How to Protect Your Data
More and more, we rely on Web services as a matter of course. The key word is rely: We assume that the data we upload to, say, a photo-hosting account or blog service today will still be there tomorrow. In large part, that's because we assume the services themselves will still be there tomorrow. Read More

Improve Your Security Leadership with One Lesson From Improv
"Your job is to make your partner look like a rock star." Read More



GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

SLIDESHOWS

4 reasons Windows Phone 7 will eventually beat iPhone and Android
Here are four reasons why Microsoft will be a major smartphone player in a few years. And three reasons it won't.

MOST-READ STORIES

  1. DARPA set to blast Falcon Mach 20 test flight
  2. Hosed productivity suites: Google Apps or Microsoft Office 365?
  3. Did Google+ ban cleavage-snuggling LEGO stormtrooper?
  4. How is the Cisco 76% off Nexus sale going over with customers? Not well.
  5. Privacy groups protest massive DHS database of secret watchlists
  6. 4 reasons Windows Phone 7 will beat iPhone and Android
  7. Raid on ChronoPay explains the demise of Mac Defender malware
  8. Operating Systems Solutions sues Apple over OS X's use of quick booting
  9. Microsoft expects Internet Explorer exploits within 30 days
  10. Tech survivors: Geek technologies that still thrive 25 to 50 years later

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment