Search This Blog

Monday, November 21, 2011

Security roundup for week ending Nov. 18: Facebook, Norway oil-industry cyberattacks, and why virtualization and mobile devices mean security stress

Raytheon gets $10.5M to develop "serious games" | Apparent cyberattack destroys pump at Ill. water utility

Network World Security

Forward this to a Friend >>>


Security roundup for week ending Nov. 18: Facebook, Norway oil-industry cyberattacks, and why virtualization and mobile devices mean security stress
Last week's flood of pornographic and violent images that hit Facebook was a coordinated spam attack that caught the attention of the world. But less remarked-upon and perhaps more sinister was what may have been a denial-of-service attack on many organizations' DNS servers, based on an exploit of the BIND 9 protocol, temporarily knocking their networks offline. The Internet Systems Consortium (ISC), which maintains several software products essential for Internet infrastructure, released a patch that's something of an interim fix for this and said it would conduct an investigation. This kind of attack -- which incapacitates entire networks, as it did in this case -- is truly worrisome. Read More


WEBCAST: ForeScout Technologies

CISO in the Know - Mitigating Modern Attacks
This webcast examines sophisticated and targeted threats, security gaps, techniques and new technologies with regards to understanding and defending against zero-day threats, propagating worms, low-and-slow attacks and advanced persistent threats (APT). Learn more.

RESOURCE COMPLIMENTS OF: Palo Alto Networks

10 Things Your Next Firewall Must Do
Choosing a next-generation firewall is more than a simple comparison of technical features. It's about balancing the needs of the business with the risks associated with modern applications. Gain access to valuable information in one location- read articles and watch videos that will empower you to make the right decision. Learn More!

Raytheon gets $10.5M to develop "serious games"
These aren't your basic video gaming systems here. The US government gave Raytheon BBN Technologies a $10.5 million today to develop what it called "serious games" that result in better decision-making by teaching players to recognize and diminish the effects of their own biases when analyzing information used to make decisions. Read More

Apparent cyberattack destroys pump at Ill. water utility
A pump at a public water utility in Springfield, Ill. was destroyed after cyberattackers gained access to a SCADA system controlling the device, according to a security expert who obtained an official report on the incident. Read More

Top IT Turkeys of 2011
Here are the people, companies and products that earned the label of 'turkey' over the past year. Read More


WHITE PAPER: i365

Trusted Data Assurance in the Cloud
Cloud-based services are here to stay. Cloud services are even more attractive for companies who are being hit with the high cost of meeting compliance requirements - especially for small and mid-size companies that have shrinking or no information security budget. Read now!

Feds back off on Jan.1 eHealth standards deadline
The Centers for Medicare & Medicaid Services is delaying by 90 days the enforcement deadline by which healthcare providers must roll out a new version of the standard governing how medical transactions are processed. Read More

US business leaders complain about China's Web control
The Chinese government is using Internet censorship as a trade weapon against U.S. tech companies trying to do business there, leaders of two business organizations have told a U.S. government commission focused on human rights in China. Read More

Study: Companies using pirated software 'save' $2.9B
Pirated software saves its users in developing countries more than $2.9 billion annually. So finds a study of manufacturers in Latin America, Central and Eastern Europe and Asia-Pacific commissioned by Microsoft. Read More


WHITE PAPER: Dell

Mobility KnowledgeVault
The resources in this Mobility KnowledgeVault provide expert guidance, peer advice, survey results and best practices to help you protect your mobile infrastructure. From determining a policy for employee-owned devices and data encryption to supporting the six major mobile operating systems, securing mobile devices and data is a top priority. View now

FAQ: What the SOPA soap opera is all about
The Stop Online Privacy Act has ignited a firestorm of protest over whether it could lead to online censorship. Here's a look at what the fight is all about. Read More

Aruba to buy Avenda for BYOD security
Wi-Fi infrastructure vendor Aruba Networks will buy Avenda Systems to expand its network security offerings and help enable BYOD (bring-your-own-device) strategies in enterprises. Read More

Wi-Fi security do's and don'ts
11 tips for protecting your wireless networks Read More

Lamest and most bizarre iPhone 5 rumors of 2011
The imagination is the petri dish of rumors, and nothing proved quite so imaginative, and entertaining, as 2011's rumors about the Apple iPhone 5. Read More



SLIDESHOWS

Geekiest holiday cards
Holiday decorations appeared before the last of the Halloween skeletons were even boxed up. An endless loop of seasonal music is already playing in stores. Retail commerce forecasts are piling up. The countdown is on, and it's not too early to start thinking about holiday cards. Here are some clever geeky options for inspiration.

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. Occupational hazard: 7 hot jobs for 2012
  2. Tech's highest-paid CEOs, biggest raises and smallest salaries
  3. Companies worry about security of cloud computing
  4. OpenFlow not the only path to network revolution
  5. Barnes & Noble blows the lid off Microsoft's Android patent squeeze
  6. Study: Companies using pirated software 'save' $2.9 billion
  7. Google, Microsoft, Intel, Verizon among new cloud-security registry members
  8. Will Thanksgiving Day upstage Black Friday for online tech sales?
  9. Will IT certs get you jobs and raises? Survey says yes
  10. Cisco how-to guides for firewalls, IPv6, contact centers

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: