Search This Blog

Tuesday, November 01, 2011

US intelligence group seeking cutting-edge, secure chip development

Double Security Whammy, No Patches: Killer SSL DDoS Attack, XML Encryption Broken | By the time you blink once, Facebook has locked out 2 potentially hacked accounts

Network World Security

Forward this to a Friend >>>


US intelligence group seeking cutting-edge, secure chip development
The cutting-edge intelligence research development arm of the government wants to take advantage of the world's semiconductor manufacturing capacity but make sure that US security and intellectual property protection is baked in. Read More


WHITE PAPER: Akamai Technologies, Inc.

Protecting Your Online Channels and Web Applications
This whitepaper gives a broad overview of the ways in which Akamai can help organizations bolster the security of their Web-based assets, with capabilities ranging across the application, network, and DNS layers, as well as solutions focused on Distributed Denial of Service (DDoS) mitigation and business continuity. Learn more

WHITE PAPER: Intel

Boost virtualization w/ HP & Intel 10GbE
This paper describes why the Intel® Ethernet X520 SFP+ Direct Attach (DA) Server Adapter for HP ProLiant Rack and Tower servers is one of the most flexible and scalable Ethernet adapters for today's demanding data center environments. Click to continue

Double Security Whammy, No Patches: Killer SSL DDoS Attack, XML Encryption Broken
The Germans have wreaked all kinds of mass destruction, a double security and privacy whammy. A hacking group released a new SSL DDoS tool that can be successfully launched from a single laptop, a single DSL connection, to take down a server. Other researchers in Germany found and exploited a flaw that breaks the W3C XML Encryption standard with a serious attack that works in all cases. The researchers... Read More

By the time you blink once, Facebook has locked out 2 potentially hacked accounts
Happy Halloween! So I'm running a bit behind today after getting a hysterical phone call from a spooked dude about his computer being haunted. The CD drive would eject on its own, the mouse was moving about as if haunted, web pages were opening in new tabs, and his mail was being opened in front of his eyes. Read More

What to look for in secure collaboration tools
Despite monumental enterprise efforts to secure information, data breaches continue to top headlines, in part because of the way employees collaborate and share data. What's needed are enterprise-level secure collaboration tools. Read More


WHITE PAPER: PhoneFactor

Phones Become the Leading Multi-Factor Authentication Device
According to a leading analyst firm phone-based authentication will comprise 61% of the multi-factor authentication market by the year 2014. This paper will address the key drivers for this market shift away from security tokens and includes real-world case studies from organizations that have made the move to phone-based authentication. Read now

Old image resize script leaves 1 million Web pages compromised
A serious code injection vulnerability affecting timthumb, a popular image resize script used in many WordPress themes and plugins, has been exploited in recent months to compromise over 1 million Web pages. Read More

Anonymous threatens to expose Mexican drug cartel
Hacker group Anonymous has threatened to expose the identity of members and supporters of a Mexican drug cartel by Nov. 5, in retaliation for the kidnapping of a group member, and has already hacked the web site of a former state official, alleging that he has associations with the dreaded Zetas. Read More

Prevent your systems from being hijacked: A quick guide
It's time to rethink some old, and now outdated, security truisms that enable a very scary kind of attack. Read More


WEBCAST: IBM

Customer Lifetime Value for IT
With technology underpinning much of the customer experience, IT and marketing must adopt new technologies to innovate and grow revenues. Watch the video to learn how IBM SPSS Predictive Analytics enables marketers while reducing the burden on IT. View Now

Lazy hackers port ancient Linux Trojan to Mac OS X
Hackers are testing new Mac malware that they've ported from a nine-year-old Trojan horse originally written for Linux, according to security experts. Read More

Cybersecurity Innovation Works from the Inside Out at SAIC
The company: SAIC Read More

Check Point buys compliance technology vendor Dynasec
Check Point Software is buying governance, risk management and compliance vendor Dynasec Ltd., which will add software that can help businesses comply with government regulations such as Sarbanes-Oxley and health insurance portability and accountability act (HIPAA). Read More



SLIDESHOWS

20 high-tech toilets
Today's techiest toilets incorporate music players, motion-activated lids, heated seats, washing and drying functions, and more. Take a look.

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. Gartner: 10 key IT trends for 2012
  2. Ubuntu Unity instead of Windows 7 and ready to scream
  3. Want a raise? 11 IT jobs set for 6%-9% pay hikes in 2012
  4. Coolest tech-o-lanterns
  5. Microsoft claims Hyper-V will leapfrog VMware
  6. DARPA offers $50,000 prize if you can figure out these shredded puzzles
  7. Two weeks with Ubuntu: Linux is great, Unity needs work
  8. Are you ready for networking in the cloud?
  9. iPhone 5 rumor roll-up for the week ending Oct. 28
  10. Cisco rolls out military-strength encryption for ISR router

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: