Search This Blog

Thursday, February 09, 2012

Researchers crack satellite phone encryption

  IRS pumps up iPhone, Android app for tax savvy | Security Researchers: 'Did Google Pull a Fast One on Firefox and Safari Users?'
 
  Network World Security

Forward this to a Friend >>>


Researchers crack satellite phone encryption
Researchers at a university in Bochum, Germany claim to have cracked encryption algorithms of the European Telecommunications Standards Institute (ETSI) that are used to secure certain civilian satellite phone communications. Read More


RESOURCE COMPLIMENTS OF: Aruba Networks

Introducing Secure BYOD over any vendor's network.
Join us on Feb. 21, 2012 as we unveil the industry's only multivendor BYOD networking solution. Aruba engineers will demonstrate how you can optimize your existing network to embrace devices of all types. This event will also feature IT architects from Sandisk, Cadence and the University of Washington, who will be sharing their BYOD experiences.

RESOURCE COMPLIMENTS OF: Palo Alto Networks

It's Time to Evolve Data Center Network Security
Palo Alto Networks, Brocade and featured guest Forrester Research, Inc. cordially invite you to a morning of discussion on the evolution of data center networks, and how leading-edge organizations are implementing next-generation data center network security to address these concerns. In the afternoon, we invite the architects and technologists to stay for a technical session of five innovative ways to integrate next-generation network security into the data center. Register for this free event here.

IRS pumps up iPhone, Android app for tax savvy
The first version of the Internal Revenue Service's IRS2Go smartphone app had 350,000 downloads and while that doesn't make it the Angry Birds of the taxpaying set, the new version could be even more popular. More news: White House fires-up science/technology extravaganza Read More

Security Researchers: 'Did Google Pull a Fast One on Firefox and Safari Users?'
Social engineering comes in all flavors, from white hats pen testing enterprise security to plain old criminals -- who happen to play in the cyber world -- so cyber criminals who want you to click on a link for a drive-by-download, otherwise convince you to download malware, or who use phishing attacks to bait you into believing lies and inputting vital life, sensitive business, or financial information.... Read More


WHITE PAPER: PC Mall

Attain Maximum ROI Through Virtualization
Virtualization is one of the hottest solutions in IT because it reduces the cost and complexity of technology. This makes businesses more responsive and improves their ability to rebound from disasters. This white paper delves into these and more virtualization benefits available from VMware. Learn More!

White House science/technology extravaganza
From President Obama firing marshmallow cannon to cool robots, the White House-hosted Science Fair showed off all manner of future technologies Read More

Free Web tool consolidates data on code vulnerabilities
Enterprise coders can now use an open source Web application that lets them consolidate software vulnerability data from a range of scanning and test tools. With a centralized view, and reporting and management tools, ThreadFix speeds the work needed to fix software bugs and vulnerabilities, including those in proliferating mobile apps. Read More


WHITE PAPER: Raritan

Why Managing VMs is So Complex
Because virtual servers coexist with nonvirtualized ones, it effectively doubles the tools and efforts relevant to data center administration. Discover how a unified, out-of-band approach that aggregates management tools into a single, consolidated platform, renders the virtual and physical layers transparent from an IT management perspective. Read now!

Trustwave admits issuing man-in-the-middle digital certificate, Mozilla debates punishment
Digital Certificate Authority (CA) Trustwave revealed that it has issued a digital certificate that enabled an unnamed private company to spy on SSL-protected connections within its corporate network, an action that prompted the Mozilla community to debate whether the CA's root certificate should be removed from Firefox. Read More

DDoS attacks motivated by politics not criminality, Arbor Networks finds
Large Internet organisations believe ideological and political motivations have become the single commonest motivation behind the DDoS attacks hitting their networks, a survey of major Internet firms by has found. Read More

Quick look: Bill Gates spanking new interactive Visitors Center
Bill & Melinda Gates Foundation open Seattle complex for inspiration Read More

 
 
 

SLIDESHOWS

Hot authentication tools
User name and password doesn't cut it anymore in the world of online financial transactions. New federal rules call for multi-factor authentication schemes to combat growing threats. The latest multi-factor measures focus on biometrics, advanced analytics, and out-of-band techniques utilizing smartphones.

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. Anonymity bites Anonymous in attempt to extort Symantec
  2. Backdoor in TRENDnet IP cameras provide real-time peeping tom paradise?
  3. IPhone 5 release set for summer 2012 -- report
  4. Apple warns developers: Don't monkey with App Store rankings
  5. The When, Where and How of Cisco vs. Microsoft for Unified Communications
  6. Controlling liquor loss with Linux
  7. Symantec verifies stolen source code posted by Anonymous is "legitimate"
  8. Programmer personality types: 13 profiles in code
  9. IPad 3 rumor rollup for the week of Feb. 7
  10. Centrex: It's alive (for now)!
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: