Search This Blog

Monday, August 01, 2011

Who's stealing your data?

How to survive Black Hat and Defcon without getting hacked -- maybe | HBGary Federal legal threats, not Anonymous chase Aaron Barr out of Defcon security conference

Network World Security: Identity Management

Forward this to a Friend >>>


Who's stealing your data?
In a number of recent newsletters we've looked at spear-phishing and how it can make your employees, customers, clients and users into unwitting dupes of the crackers and malfeasants who are trying to steal the "family jewels" of your organization. Just ask the folks at RSA (who insist that they are the "security division" of EMC). Read More


WEBCAST: Riverbed

Accelerating Your Virtual Environment with WAN Optimization
Which applications in your virtual environment do you want to accelerate the most? This Webcast surveys the applications that suffer the most from latency and discusses the 3 root causes of poor wide-area application performance. See how you can realize dramatic improvements in replication in virtual machines. Learn More!

WEBCAST: Riverbed

3 Ways WAN Optimization Pays Back
One of the most complicated and expensive endeavors that an IT organization ever undertakes is disaster recovery. If you have DR requirements that aren't being met, before you think about buying more bandwidth or looking at other complex solutions, you should really look at Riverbed WAN Optimization. Watch the video to learn more. Learn more!

How to survive Black Hat and Defcon without getting hacked -- maybe
Among the thousands of security experts at the Black Hat, Defcon and Security BSides conferences next week in Las Vegas, some will surely test whether they can break into nearby laptops, phones, networks -- even RFID-enabled room keys and credit cards. Read More

HBGary Federal legal threats, not Anonymous chase Aaron Barr out of Defcon security conference
Aaron Barr, the tech executive who bailed out of a talk at the Security B-Sides conference after the hacker collective Anonymous attacked the company he worked for, is bailing out of yet another conference, this time chased away by his former boss. Read More

'War texting' lets hackers unlock car doors via SMS
Software that lets drivers unlock car doors and even start their vehicles using a mobile phone could let car thieves do the very same things, according to computer security researchers at iSec Partners. Read More

Anonymous claims to have breached ManTech International's network
A tweet sent by the hacker group Anonymous at midnight yesterday claims the group has broken into the network of defense contractor ManTech International and intends to release seized documents within 24 hours. Read More


WHITE PAPER: CA Technologies

The Value of Service-Centric Visibility
IT organizations are under pressure to avert problems before they occur. To achieve the proactive approach required and move to the next level of service delivery, they need "service-centric" visibility that ties infrastructure components to the services that rely on them. Read More

Malwarebytes preps enterprise edition of PC-cleaning software
Malwarebytes this fall expects to release an enterprise-grade anti-malware platform that it says doesn't compete directly with traditional antivirus software because it relies more on observing how the malware acts and less on seeking code signatures. Read More

Microsoft fixes Mac Office bug in Apple's Lion
Microsoft Thursday released an updated version of Communicator for the Mac that works with Apple's Lion operating system. Read More

Apple has more cash than US government! Buyout not imminent though
Given the current level of disarray and ineptitude of the elected officials in Washington DC right now this news probably shouldn't be all that shocking: Apple with its $76 billion in the bank has more cash than the US with its almost $74 billion. The news has prompted a variety of reactions. More wacky news: 20 of the weirdest, wackiest and stupidest sci/tech stories of 2011 (so far!) Read More

Facebook to pay hackers for bugs
Facebook is going to pay hackers to find problems with its website -- just so long as they report them to Facebook's security team first. Read More


WHITE PAPER: Riverbed

Application-Aware Network Performance Management
Riverbed® Cascade© stacks up extremely well against the competition. How well? In particular, Cascade outperforms other application-aware network performance management solutions in such important areas as product strength and cost efficiency. Read Now.

Judge gives second AT&T iPad hacker more time to make deal
A federal judge has put the case against a man charged with hacking AT&T's website last year on hold to allow plea negotiations to continue, court documents show. Read More

E-commerce sites based on open source code under attack
About 100,000 Web pages for e-commerce sites based on the open source OS Commerce software have been compromised with malware through a mass iFrame injection attack, according to security firm Armorize. Read More

House panel votes to require ISPs to keep customer records
A House committee passes a bill that would require ISPs to retain customer IP information for a year as a way to combat child pornography. Read More

Tenn. BlueCross finishes enterprise-wide data encryption
BlueCross BlueShield of Tennessee said today it has completed a year-long effort to encrypt all of its at-rest data, a move it took after 57 of its hard drives were stolen in 2009. Read More



GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Enter here.

SLIDESHOWS

The Geekiest iPad Apps Ever
We scoured the App Store to find the "geekiest" apps out there for the true purveyor of all things geek.

MOST-READ STORIES

  1. Wham Bam Google Ban: No Pseudonyms on Google Plus Profiles
  2. The 5 biggest IT security mistakes
  3. How to implement IPv6 in a Windows environment: an expert guide
  4. Why I was banned on Google+ (and how I redeemed myself)
  5. 15 incredibly useful (and free) Microsoft tools for IT pros
  6. Cisco rival Juniper lands Microsoft's Muglia
  7. Law firm rallies AT&T customers to block T-Mobile merger with lure of cash
  8. 10 technologies that will change the world in the next 10 years
  9. 10 things you shouldn't be able to buy online
  10. The problem with weak passwords and hijacked Hotmail

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: