Search This Blog

Wednesday, February 08, 2012

Symantec verifies stolen source code posted by Anonymous is "legitimate"

FTC warns background screening mobile apps may be unlawful | Anonymity bites Anonymous in attempt to extort Symantec

Network World Security

Forward this to a Friend >>>


Symantec verifies stolen source code posted by Anonymous is "legitimate"
Symantec is in an ongoing fight against hackers in the group Anonymous that last January attempted to extort a payment of around $50,000 from Symantec in exchange for not publicly posting stolen Symantec source code they had stolen for various older Symantec security products dating to 2006. Read More


RESOURCE COMPLIMENTS OF: Palo Alto Networks

Gartner Names Palo Alto Networks a Leader
Palo Alto Networks was named leader for Enterprise Network Firewalls. According to Gartner, vendors in the leaders quadrant "lead the market in offering new safeguarding features, providing expert capability, rather than treating the firewall as a commodity, and having a good track record of avoiding vulnerabilities in their security products." Click to continue

RESOURCE COMPLIMENTS OF: Citrix

Is your network ready for the Cloud? Not with F5.
The Iron Age is over. The Cloud Age is here. Shift to Citrix NetScaler. • 2x faster 2048-bit SSL performance. • 5x capacity on demand - no new hardware. • Consolidation of up to 40 appliances into a single platform. • All functionality, all devices, all the time. Shift up to the Cloud. See why every major Cloud has a Citrix lining. Download 8 Reasons Citrix NetScaler beats F5.

FTC warns background screening mobile apps may be unlawful
The Federal Trade Commission this week said it sent letters to six unidentified mobile applications makers warning them that their background screening apps may be violating federal statutes. Read More

Anonymity bites Anonymous in attempt to extort Symantec
There's something ironic about the anonymity afforded by the Internet putting a self-proclaimed member of the hacker group Anonymous in the position of negotiating extortion demands with a law enforcement officer posing as a Symantec employee. Read More

5 ways to secure your Facebook profile in a post-Timeline world
With the ongoing rollout of Facebook's Timeline feature, security and privacy have never been more important to your digital life. The new layout presents all of your current and past activities on Facebook -- posts, photos, comments, likes and so on -- in a handy timeline format to anyone with access to your profile, which may include friends of friends, colleagues, executives at your company, a potential future boss ... well, you get the idea. Read More


WHITE PAPER: Cyrus One

The Myth of Latency
Any company seeking a colocation partner will put geography near the top of the list of selection criteria. But there's one area where its importance is debatable, and that's the issue of latency. Learn More!

Denial-of-service attacks are on the rise, anti-DDoS vendors report
Both the number and volume of distributed denial-of-service attacks are increasing, according to new reports from DDoS mitigation companies Prolexic and Arbor Networks. Read More

Data breach? Blame your third party's remote access systems
An in-depth study of data-breach problems last year where hackers infiltrated 312 businesses to grab gobs of mainly customer payment-card information found the primary way they got in was through third-party vendor remote-access applications or VPN for systems maintenance. Read More

Backdoor in TRENDnet IP Cameras Provide Real-Time Peeping Tom Paradise?
What happens when a console cowboy identifies a security vulnerability in Trendnet streaming IP cameras? Nearly a month later countless people have snuck in the backdoor without password authentication for a peep show. The vulnerability allows users to tune in and to spy in real-time on thousands of private lives via Trendnet home security cameras. Read More


WHITE PAPER: Internap

New eBook: Managed Hosting Buyer's Guide
Looking to relieve the daily pressures on your current IT Infrastructure through Managed Hosting? This e-book provides managed hosting buyers essential tools for selecting or re-evaluating service providers. Learn More

Quick look: Bill Gates' spanking new interactive Visitors Center
Bill & Melinda Gates Foundation opens Seattle complex for inspiration Read More

Something fishy about Google Chrome's Safe Browsing API, lab says
A research firm that measures the security effectiveness of browsers noticed something it thought might be fishy with the way Chrome was doing things. Turns out, there may currently be a privacy concern about Google's use of end user IP addresses as part of its Safe Browsing API. Read More

FBI declares cloud vendors must meet CJIS security rules
The FBI Tuesday reaffirmed its rule that all cloud products sold to to U.S. law enforcement agencies must comply with the FBI's Criminal Justice Information Systems security requirements. Read More

Europe cares about privacy, so you must too
In late January, the European Commission published a proposal "on the protection of individuals with regard to the processing of personal data and on the free movement of such data." Read More

Adobe sets IE as next target in Flash security work
Adobe next plans to tackle Microsoft's Internet Explorer in its ongoing work to "sandbox" its popular Flash Player within browsers, Adobe's head of security said today. Read More



SLIDESHOWS

Hot authentication tools
User name and password doesn't cut it anymore in the world of online financial transactions. New federal rules call for multi-factor authentication schemes to combat growing threats. The latest multi-factor measures focus on biometrics, advanced analytics, and out-of-band techniques utilizing smartphones.

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. Anonymous claims to have released source code of Symantec's pcAnywhere
  2. Highly anticipated net virtualization startup Nicira exits stealth mode
  3. Programmer personality types: 13 profiles in code
  4. The When, Where and How of Cisco vs. Microsoft for Unified Communications
  5. Global broadband snapshot: Hong Kong throttles the rest of the world
  6. Mobile device management: Apple's extra little tricky requirement
  7. IT job spotting: Top 20 metro areas for tech jobs
  8. In-flight Wi-Fi struggling to gain altitude
  9. Hot authentication tools
  10. Data breach? Blame your third party's remote access systems

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: