Search This Blog

Wednesday, November 16, 2011

DARPA calls for powerful, secure wireless system to link space satellites

FAQ: What's the big deal about Duqu? | Busted! DOJ says you might be a felon if you clicked a link or opened email

Network World Security

Forward this to a Friend >>>


DARPA calls for powerful, secure wireless system to link space satellites
Getting a series of small satellites to communicate and act as one unit in space while taking commands from Earth-bound command centers is a gargantuan wireless task. But the researchers at the Defense Advanced Research Projects Agency (DARPA) are looking for technology that does just that. Read More


RESOURCE COMPLIMENTS OF: SafeNet

Future Proof Your Authentication Strategies
Remember when strong authentication meant a token for VPN? Now, you've got a full workforce of road warriors, new Cloud applications, and employee iPads on the network. Throw in the current "breach of the day" climate and you have to ask yourself, am I ready for the future? Prepare yourself for the road ahead with SafeNet Authentication.

RESOURCE COMPLIMENTS OF: Palo Alto Networks

10 Things Your Next Firewall Must Do
Choosing a next-generation firewall is more than a simple comparison of technical features. It's about balancing the needs of the business with the risks associated with modern applications. Gain access to valuable information in one location- read articles and watch videos that will empower you to make the right decision. Learn More!

FAQ: What's the big deal about Duqu?
The recently discovered Duqu Trojan has gotten a lot of attention in the security research community. Here's why. Read More

Busted! DOJ says you might be a felon if you clicked a link or opened email
We may be doomed and you are probably a felon if you ever used a fake name online, used a bogus birthday to register on a site, or fibbed about your height or weight on an online dating profile, named a different town or city in a profile, or basically didn't tell the exact truth anywhere online. Never done that? Read More

It's Time To Child-Proof Our Networks
As the old security cliche goes, "people are the weakest link in the security chain." ESG tested this theory in its recently-published research report, "U.S. Advanced Persistent Threat Analysis." http://www.enterprisestrategygroup.com/2011/11/apt/?utm_source=Homepage&... According to the security professionals surveyed for this report, non-IT employees' security skills remain poor: * 49% of respondents... Read More


WEBCAST: ForeScout Technologies

CISO in the Know - Mitigating Modern Attacks
This webcast examines sophisticated and targeted threats, security gaps, techniques and new technologies with regards to understanding and defending against zero-day threats, propagating worms, low-and-slow attacks and advanced persistent threats (APT). Learn more.

Mobile Voice and Data Availability: it's an internet security issue
The other day I was at my friend's house in Washington, Virginia, (just beyond the middle of nowhere) where mobile phone service is nonexistent. Up until recently the only way to use my Verizon mobile at his house was to use WiFi for voice (via softphone) and data. On this recent visit, my friend proudly pulled out his Sprint phone to show me his five-bar service. He had installed a femtocell. It's... Read More

FBI investigating intrusion into university records system to alter grades
The computerized records system at Santa Clara University in California was compromised to alter student grades, an official of the university said. Read More

Why Law Enforcement Can't Stop Hackers
On July 19, 2011, FBI agents in nine states rounded up 14 men and two women ranging in age from 21 to 36 for their alleged involvement with the international hacking group Anonymous. Fourteen of these individuals were arrested for allegedly plotting and executing a distributed denial of service (DDoS) attack in December 2010 that took down PayPal's Website. Read More


WHITE PAPER: i365

Trusted Data Assurance in the Cloud
Cloud-based services are here to stay. Cloud services are even more attractive for companies who are being hit with the high cost of meeting compliance requirements - especially for small and mid-size companies that have shrinking or no information security budget. Read now!

Apple secures iTunes update checking to address man-in-the-middle vulnerability
Apple's iTunes 10.5.1 update addresses a weakness in the application's update mechanism that could be exploited to trick users into visiting malicious websites. Read More

Researchers find new way to hide messages in VoIP
Researchers have devised a new scheme for hiding secret data within VoIP packets, making it possible to carry on legitimate voice conversations while stolen data piggybacks on the call undetected, making its way to thieves on the outside. Read More

W3C releases draft online privacy standards
The World Wide Web Consortium (W3C) has released the first draft of two standards intended to protect the privacy of Web users and allow them to opt out of Web tracking systems. Read More

Facebook users flooded with adult images in mystery hack
For the past several days, many Facebook users have been seeing adult images in their news feeds that feature pornography, violence and animal abuse -- the result of what security analysts say is a mystery attack. Read More

iOS, Android to get federal-strength authentication
Businesses also gain a new Android app management and provisioning tool Read More



SLIDESHOWS

Geekiest holiday cards
Holiday decorations appeared before the last of the Halloween skeletons were even boxed up. An endless loop of seasonal music is already playing in stores. Retail commerce forecasts are piling up. The countdown is on, and it's not too early to start thinking about holiday cards. Here are some clever geeky options for inspiration.

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. Will IT certs get you jobs and raises? Survey says yes
  2. Do you give up privacy by carrying a cell phone?
  3. Survey: IT certifications lead to jobs, higher pay
  4. Barnes & Noble blows the lid off Microsoft's Android patent squeeze
  5. iPhone battery's bad rap
  6. Huawei buys out Symantec in joint venture
  7. Arista again looks to buck Cisco, others in data center
  8. IBM targets managed security service at smartphones
  9. AT&T to add six more LTE cities on Sunday
  10. Gartner: The top 10 strategic technology trends of 2012

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: