Search This Blog

Friday, February 03, 2012

Super Bowl super bust: US seizes 307 websites; grabs $4.8M in fake NFL merchandise

Microsoft team discovers malicious cookie-forwarding scheme | FBI busts software copyright fugitive who fled to Pakistan

Network World Security

Forward this to a Friend >>>


Super Bowl super bust: US seizes 307 websites; grabs $4.8M in fake NFL merchandise
The piracy, counterfeit and copyright battle has moved to the Super Bowl. Read More


WHITE PAPER: NetIQ

Security Information and Event Management eGuide
Security threats these days are increasingly focused on critical components of enterprise infrastructures – the servers, databases, and directories that store and manage crucial corporate information. Learn More!

RESOURCE COMPLIMENTS OF: CloudPassage

CloudPassage
Infrastructure-as-a-Service (IaaS) is one of the fastest-growing cloud computing sectors. However, cloud providers usage agreements make the user responsible for protecting servers, applications and data. CloudPassage Halo is the award winning cloud server security platform that has everything you need to secure your cloud servers. Get Free Halo Basic Today!

Microsoft team discovers malicious cookie-forwarding scheme
Microsoft researchers checking how easy it is to identify users by analyzing commonly collected Web-log data incidentally discovered a cookie-forwarding scheme that can be used to aid session hijacking. Read More

FBI busts software copyright fugitive who fled to Pakistan
The FBI today said it arrested a man on charges of illegally reproducing and distributing more than 100 copyrighted commercial software programs who had fled the country after being indicted last year. Read More

Microsoft researchers say anonymized data isn't so anonymous
Data routinely gathered in Web logs - IP address, cookie ID, operating system, browser type, user-agent strings - can threaten online privacy because they can be used to identify the activity of individual machines, Microsoft researchers say. Read More


WHITE PAPER: Raritan

What to Look for in Smart Card Readers
Deploy servers with PKI authentication without sacrificing convenience or security. Learn how modern KVM switches with smart card capabilities go beyond simply integrating card readers as an additional peripheral at the KVM workstation, but rather make necessary KVM feature adjustments to enable seamless use of the reader. Learn More

Steven Colbert avoids toilet controversy, just loves NASA to pieces!
Stephen Colbert, host of the nightly 'The Colbert Report,' and NASA supporter says he loves space and loves it more now because of what research work NASA is doing with the International Space Station. In a public service announcement released today Colbert says: "I love looking up at the stars and wondering what distant planets are still out there and to be discovered and can we frack them for methane."... Read More

Top 20 metro areas for tech jobs
Dice.com reports the top 20 metro areas for tech jobs, based on how much IT pros are getting paid and the number of open positions. Read More

Anticipating the RSA Conference 2012
It's now February although you'd never know it from the balmy winter here in Boston. Aside from Valentine's Day, February is significant because it is when security geeks from around the world get together in San Francisco for the RSA Conference. The show doesn't start until 2/27 but you can feel the anticipation in the air across the whole security community. That's a good thing since... Read More


WHITE PAPER: Akamai Technologies, Inc.

Protecting Your Online Channels and Web Applications
This whitepaper gives a broad overview of the ways in which Akamai can help organizations bolster the security of their Web-based assets, with capabilities ranging across the application, network, and DNS layers, as well as solutions focused on Distributed Denial of Service (DDoS) mitigation and business continuity. Learn more

Ice IX banking Trojan steals info that enables fraudsters to hijack phone calls
New variants of the Ice IX online banking Trojan program are tricking victims into exposing their telephone account numbers so that fraudsters can divert post-transaction verification phone calls made by banks to phone numbers under their control, researchers from security vendor Trusteer warned. Read More

Married to your desk? 5 tips for a better relationship
Here's a sobering statistic: With a 40- to 45-hour work week, many Americans spend about 25% of the year on the job. For those of us who stare at computer screens all day, that amounts to more than 2,000 hours with our keisters glued to chairs. In less technical terms, we're practically married to our desks. Read More

Trojan found breaking Yahoo CAPTCHA security in minutes
Researchers have discovered a malware engine that appears to be able to break the CAPTCHA security used by Yahoo's webmail service after only a handful of attempts. Read More



SLIDESHOWS

The world's geekiest license plates
This slideshow goes out to all those drivers who aren't afraid to say it loud: I'm a geek and I'm proud. It's filled with images of vanity plates so geeky that they prompted someone else to take a picture and post it on Flickr. Enjoy.

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. iPhone 5 rumor rollup for the week ending Feb. 2
  2. HTC Android phones can leak Wi-Fi passwords
  3. Cisco Ethernet switches make big leap to 40G/100G
  4. iPad 3 rumor rollup for the week ending Jan. 31
  5. 13 Windows 8 features worth knowing about
  6. What Facebook's IPO means for users
  7. F5 shakes up the firewall market
  8. Apple forcing IT shops to 'adapt or die'
  9. Tech's original Great Satan calls out Google for being evil
  10. Can homeland security prevent a cybersecurity critical infrastructure disaster?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: