Search This Blog

Thursday, September 15, 2011

U.S. needs to be on-guard for a big cyber-attack

Microsoft patches 15 bugs, nukes more SSL certificates | If You Use It, Mobile Malware Will Come

Network World Security

Forward this to a Friend >>>


U.S. needs to be on-guard for a big cyber-attack
A destructive attack from cyberspace "is coming, in my opinion. It is a question of time. What we don't know is how far out it is," and whether it will target commercial infrastructure, government networks or mobile platforms Army Gen. Keith Alexander told attendees of the "Maneuvering in Cyberspace" symposium this week. Read More


WHITE PAPER: IBM

Next generation data integration from TDWI Research
In November 2010, TDWI sent an invitation via e-mail to the data management professionals in its database, asking them to complete an Internet-based survey. The resulting completed responses of 323 respondents form the core data sample for this report. Read Now

RESOURCE COMPLIMENTS OF: Palo Alto Networks

10 Things Your Next Firewall Must Do
Choosing a next-generation firewall is more than a simple comparison of technical features. It's about balancing the needs of the business with the risks associated with modern applications. Gain access to valuable information in one location- read articles and watch videos that will empower you to make the right decision. Learn more!

Microsoft patches 15 bugs, nukes more SSL certificates
Microsoft today patched 15 vulnerabilities in Windows, Office and other software with five security updates. Read More

If You Use It, Mobile Malware Will Come
No matter what mobile platform you choose, be it Android, iOS or BlackBerry, you run the risk of infection and data theft. Read More

Banksy had right: The future holds a mere 15 minutes of anonymity for everyone
All humans have a superpower. Now don't scoff and roll your eyes as your superpower is more like where you excel or are naturally gifted. For some people, it's organizing an event, raising money, cheering people up, "the gift of gab," etc. While nowhere as effective as Harry Potter's invisibility cape, some people who are concerned about privacy have the "superpower" of invisibility. Other folks post... Read More


WHITE PAPER: VeriSign

DDoS: Finally Getting the Attention it Deserves
Verisign commissioned a market research study to investigate just how concerned IT decision makers are with the threat of DDoS attacks and what - if anything - they are doing to prepare for the increased threats in today's ever evolving cyber landscape. The results in this paper are very revealing. Read Now!

Homeland Security Digital Library – Priceless resource
The Naval Postgraduate School Center for Homeland Security and Defense (CHSD) is a world-standard institution in information assurance (IA) and homeland security (HS) education. Established in 2003 as a response to the horrific events of 9/11, the CHSD is also the home of a valuable resource for all IA and HS professionals: the Homeland Security Digital Library (HSDL). Read More

US agencies making progress on cybercrime, officials say
U.S. government agencies are getting better at sharing information about cyberattacks with private companies, but cybercrime shows no signs of slowing down, cybersecurity experts told lawmakers Wednesday. Read More

Windows 8 will run from USB thumb drive
Windows 8 will include a new feature that lets IT administrators provide workers with a portable Windows environment on a USB thumb drive. Read More


WHITE PAPER: CA Technologies

The Most Important Metric for your VMs
The management tools selected to support virtualization is essential to the ability of IT to grow the virtual environment without proportionately increasing the staff to manage all of the new physical host servers and their guest VMs. Learn More

Symantec cloud-based service seeks out 'rogue certificates'
Symantec this week introduced what it calls the Symantec Certificate Intelligence Center, a cloud-based service that works with an on-premises software component to keep track of SSL server certificates used by an organization. Read More

US wants electronic cigarettes banned on aircraft
If you thought those electronic cigarettes which deliver nicotine in a vapor form might slide by on airlines, the US Department of Transportation has some bad news for you. It wants them banned. Read More

Measuring impact of Wi-Fi denial-of-service attacks
A research team at North Carolina State University has proposed a way of measuring the impact of wireless denial-of-service attacks on Wi-Fi networks. It's a step toward building focused counter-measures that can make such attacks costly to pull off. Read More

Android targeted by SpyEye banking Trojan
Banking transactions for owners of Android phones just became more dangerous with a new iteration of the SpyEye Trojan designed to intercept two-factor authentication codes sent via SMS -- the first known version for Android. Read More

Senator to businesses: Protect data or pay
Senator Richard Blumenthal says his data breach legislation will deter data breaches. IT security experts have their doubts. Read More



SLIDESHOWS

Cloud companies to watch: A product sampler
Our Cloud Companies to Watch story gives you the lowdown on a handful of startups looking to make their mark in a business so far dominated by the likes of Amazon, Google, Rackspace and VMware. Here's a closer look at some of the products and services being rolled out by these newcomers.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

MOST-READ STORIES

  1. It's Programmer Day! ... (is that the best you can do?)
  2. Android texts take to traveling
  3. Cisco unveils routers, takes swipe at Juniper
  4. Cisco's new aggression
  5. Why FCoE is dead, but not buried yet
  6. Microsoft woos developers with Windows 8 demonstration
  7. Juniper follows Cisco with edge upgrade
  8. 7 hot cloud companies to watch
  9. iPhone 5 rumor rollup for the week ending Sept. 9
  10. Windows 8: A visual tour of what we now know

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: