Search This Blog

Thursday, February 02, 2012

HTC Android phones can leak Wi-Fi passwords

  F5 Shakes Up the Firewall Market | NASA's 16 top technical challenges for the next 5 years
 
  Network World Security

Forward this to a Friend >>>


HTC Android phones can leak Wi-Fi passwords
A group of HTC Android phones is susceptible to an exploit that can steal Wi-Fi (802.1X) credentials and passwords and send them to attackers. Read More


WHITE PAPER: Google Apps

Google: Security for Google Apps Messaging & Collaboration
This paper will explain the ways Google creates a security-based platform for offering its Google Apps products, covering topics like information security, physical security and operational security. Read now.

RESOURCE COMPLIMENTS OF: CloudPassage

CloudPassage
Secure your Rackspace cloud servers with CloudPassage Halo. CloudPassage is the award winning cloud server security platform that has everything you need. Get Free Halo Basic Today!

F5 Shakes Up the Firewall Market
The high-end of the firewall market has really been dominated by two companies: Crossbeam Systems (with Check Point Software) and Juniper Networks. Over the past few years, these two firms won most of the high revenue/high margin enterprise and service provider deals. Of course, others took notice and wanted their own piece of the pie. Cisco came out with its ASA 5580 a few years back. Network... Read More

NASA's 16 top technical challenges for the next 5 years
Drastically reduce the costs of safely and reliably getting into space; more effectively mitigate the impact of space radiation on humans; develop more robust mobile robotics and build a new generation of space telescopes to more effectively study space are just a few of the 16 high-priority technologies NASA should be working on in the next five yea Read More


WHITE PAPER: NetIQ

Security Information and Event Management eGuide
Security threats these days are increasingly focused on critical components of enterprise infrastructures – the servers, databases, and directories that store and manage crucial corporate information. Learn More!

For 'Malware as a Service' merchants, business is booming
Malware merchants have matured, and are more diversified and dangerous than ever. Read More

Kelihos botnet, once crippled, now gaining strength
A botnet that was crippled by Microsoft and Kaspersky Lab last September is spamming once again and experts have no recourse to stop it. Read More


WHITE PAPER: VCE/VMware

Driving Business Value with VBlock Infrastructure Platforms
With Vblock Infrastructure Platforms, organizations of any size can rapidly deploy a pervasive virtual infrastructure and implement a private cloud while lowering risk and operating expenses. Learn More

Romanian authorities arrest man suspected of hacking into NASA and Pentagon servers
Romanian authorities have arrested a 20-year-old man from the city of Timisoara on Monday under accusations that he hacked into computer systems belonging to NASA and the U.S. Department of Defense. Read More

WikiLeaks' Assange takes appeal to UK Supreme Court
WikiLeaks founder Julian Assange launched his appeal in the U.K. Supreme Court on Wednesday in his last attempt in Britain to avoid extradition to Sweden to face sexual assault allegations. Read More

What Is Deep Packet Inspection?
It's easy to turn a deaf ear to the controversy surrounding recent copyright protection bills like the Stop Online Piracy Act (SOPA) or the PROTECT IP Act, which threatened to curtail free speech on the Internet by allowing the U.S. Department of Justice to blacklist and block access to websites suspected of copyright infringement. Most of us don't visit websites suspected of illegally distributing copyrighted material, so blocking us from accessing them seems harmless. But should your ISP ever be legally obligated to prevent you from accessing restricted websites, it will have to find a way to monitor your online activity, and that could cause your Read More

Can Homeland Security prevent a cybersecurity critical infrastructure disaster?
The U.S. is headed toward a "cybersecurity disaster," according to a Bloomberg Government study. Read More

 
 
 

SLIDESHOWS

The world's geekiest license plates
This slideshow goes out to all those drivers who aren't afraid to say it loud: I'm a geek and I'm proud. It's filled with images of vanity plates so geeky that they prompted someone else to take a picture and post it on Flickr. Enjoy.

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. iPad 3 rumor rollup for the week ending Jan. 31
  2. Apple forcing IT shops to 'adapt or die'
  3. Stealing smartphone crypto keys using plain old radio
  4. Cisco Ethernet switches make big leap to 40G/100G
  5. Social media monitoring on gov't steroids
  6. 13 Windows 8 features worth knowing about
  7. IPhone 5 production set to begin
  8. End-of-life Cisco hardware - what are your options?
  9. Cisco aims Wi-Fi access point at iPad profusion
  10. IRS helps bust 105 people in massive identity theft crackdown
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: