Search This Blog

Thursday, January 05, 2012

Smart Grid Security Inadequate, Threats Abound

  SpyEye malware borrows Zeus trick to mask fraud | Check Point supports cloud security for Amazon Web Services
 
  Network World Security

Forward this to a Friend >>>


Smart Grid Security Inadequate, Threats Abound
Near chaos. That's the current state of security for smart grids, according to Pike Research. A recent report by the research firm finds that a lack of security standards, a hodgepodge of products and increasingly aggressive malicious hackers will make 2012 a challenging year for securing smart grids. (A smart grid uses IT and smart meters in an effort to make electric utilities more efficient, reliable and sustainable.) Read More


WEBCAST: ForeScout Technologies

Experts Help CIOs Rethink Threat Prevention
This webcast examines sophisticated and targeted threats, security gaps, techniques and new technologies with regards to understanding and defending against zero-day threats, propagating worms, low-and-slow attacks and advanced persistent threats (APT). Learn more.

WHITE PAPER: CA Technologies

Can you handle more web traffic than you ever dreamed of?
In this executive Q&A, Cloud Luminary and DonorsChoose.org CTO Oliver Hurst-Hiller discusses the importance of being able to seamlessly and quickly switch to a cloud service, the benefits of having all aspects of your company moved to the cloud, and more. Learn More

SpyEye malware borrows Zeus trick to mask fraud
A powerful bank-fraud software program, SpyEye, has been seen with a feature designed to keep victims in the dark long after fraud has taken place, according to security vendor Trusteer. Read More

Check Point supports cloud security for Amazon Web Services
Check Point and Amazon Web Services are teaming up to enable Check Point Security Gateway functionality to boost cloud security for business assets. Read More


WHITE PAPER: Quantum

Big Data: Managing Explosive Growth
Are you experiencing a data explosion? The trend toward leveraging Big Data for competitive advantage helps IT professionals successfully meet business goals. Learn how to reliably manage, store and access vast amounts of archived data while protecting it and keeping costs low. View Now

Hacking For Privacy: 2 days for amateur hacker to hack smart meter, fake readings
At the Chaos Communication Congress in Germany, 28C3, researchers presented "Smart Hacking For Privacy." After analyzing data collected by a smart meter, these gentlemen were able to determine devices like how many PCs or LCD TVs in a home, what TV program was being watched, and if a DVD movie being played had copyright-protected material. In other words, smart meters do have privacy implications that... Read More

Two new security books ponder: Just how vulnerable are we?
Two recently-published books, "America the Vulnerable" by Joel Brenner, a former official at the National Security Agency (NSA) and "When Gadgets Betray Us," by writer and security analyst Robert Vamosi, have one theme in common: We've come to depend on modern networks and technology, but the compromise of them by attackers is a serious threat to both individuals and society as a whole. Read More


WHITE PAPER: Sybase

Enterprises Falling Short with Analytics Tools
This paper examines the use of analytics and reporting, and offers best practices for integrating solutions for improved business decision-making. Learn More

Tips from IT professionals on how to handle virtual desktops, wireless, network performance issues
Schools are for learning, and the information technology and security professionals who support networks and applications in the nation's K-12 and university systems are discovering new tactics in what can be challenging IT environments. Here we talk to four professionals in the education realm to get a sense for their top IT issues and what they do to handle them. Read More

History's infamous social engineers
Read More

15 cool energy projects of 2011
Solar trains, plane, automobiles and even spacecraft among advanced 2011 undertakings Read More

Murder, IT security and other mysteries: The stories of Layer 8 in 2011
Today we take a short look back at the most popular stories posted in my Layer 8 column in the past year. The FBI story looking for help from the public was by far the most popular of the year. Read on: FBI wants public help solving encrypted notes from murder mystery Read More

 
 
 

SLIDESHOWS

10 essential data center appliances
With all of the noise in data center networking focused on switches, fabrics and lossless Ethernet standards, appliances like WAN optimizers and application accelerators are often overlooked. But they are important components of the data center/cloud infrastructure, especially as organizations virtualize desktop applications for remote sites. Here's a listing of 10 of the top players, and their products, in data center appliances.

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. Cisco dumps the UMI personal telepresence very quietly
  2. 5 major changes facing the Internet in 2012
  3. iPhone 5 rumor rollup for the week ending Dec. 31
  4. Up-and-coming tech jobs -- and how to land one
  5. Mobility, cloud, analytics to reshape IT in 2012
  6. Users desert Windows XP in near-record numbers
  7. 10 programming languages that could shake up IT
  8. Two new tools exploit router security setup problem
  9. Working out RIM's BlackBerry Bold 9930 over Christmas break
  10. Microsoft releases first unscheduled patch of 2011
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: