Search This Blog

Monday, March 12, 2012

10 scariest hacks from Black Hat and Defcon

Microsoft to patch Windows bug called 'Holy Grail' by one researcher | What's up with these solar storms?

Network World Security

Forward this to a Friend >>>


10 scariest hacks from Black Hat and Defcon
With Black Hat Europe taking place this week, we review the most recent Black Hat and Defcon conferences where researchers showed off attacks on everything from browsers to automobiles, demonstrating ingenuity and diligence in circumventing security efforts or in some cases in exploiting systems that were built without security in mind. Here's a handful of the ones that deserve the most concern. Read More


RESOURCE COMPLIMENTS OF: Cisco

Do You Need to Lock It Down or Free It Up?
With companies moving towards the cloud, trends in BYOD, and stricter policy enforcement requirements, every CIO needs more transparent and efficient networks. Christopher Young, SVP of Cisco's Security and Government Group, reveals how context awareness and security enablement empower businesses to embrace the global workforce and mitigate risk. Watch the keynote

WHITE PAPER: NetIQ

Security Information and Event Management eGuide
Security threats these days are increasingly focused on critical components of enterprise infrastructures – the servers, databases, and directories that store and manage crucial corporate information. Learn More!

Microsoft to patch Windows bug called 'Holy Grail' by one researcher
Microsoft on Thursday said it would ship six security updates next week, only one critical, to patch seven vulnerabilities in Windows and a pair of for-developers-only programs. Read More

What's up with these solar storms?
Solar storms are raging, how will the impact Earth? Read More


WHITE PAPER: PhoneFactor

Phone Become the Leading Multi-Factor Authentication Device
According to a leading analyst firm phone-based authentication will comprise 61% of the multi-factor authentication market by the year 2014. This paper will address the key drivers for this market shift away from security tokens and includes real-world case studies from organizations that have made the move to phone-based authentication. Learn More

Final Thoughts on the RSA Conference 2012
Okay, it's been a week since the RSA Security Conference 2012 so my window of opportunity for editorial comment is nearly closed. A few last thoughts: Read More

Lockheed: Prototype Space Fence tracking orbital debris
Lockheed Martin says the prototype system it is developing to track all manner of space debris is now tracking actual orbiting space objects. Read More


WHITE PAPER: GFI Software

GFI VIPRE Antivirus Business 5.0
This free fully-functioning 30-day trial of GFI VIPRE Business is designed to optimize overall performance by melding antivirus and antispyware together into one powerful engine. Learn More

IETF explores new working group on identity management in the cloud
Proponents of a common scheme for managing user identity in cloud-based applications will pitch their idea to the Internet's premier standards-setting body at a meeting in Paris later this month. Read More

New key technology simplifies data encryption in the cloud
Many companies cite data security as their top inhibitor to cloud adoption. Data encryption is a logical security measure, but key management can be tricky. Now there's a new service that simplifies key management while ensuring that no one but the data owner ever knows the master key. Read More

Anonymous defaces police equipment supplier site, releases Symantec code
For the second time this week, hackers associated with the Anonymous hacking collective have taken down a website in retaliation for the arrests of several of their prominent members. Read More

Joint ventures by US tech firms with China pose cyberwar risk: report
Should conflict occur, China's cyberwar plans target the U.S., and today's Chinese joint ventures with U.S. manufacturers in hardware, software and telecommunications create a "potential vector" for the People's Liberation Army (PLA) to exploit and compromise, says a report from the U.S.-China Economic and Security Review Commission sent to Capitol Hill today. Read More



SLIDESHOWS

Inside Apple's iPad world-wide ubiquity
As the new iPad emerges, we look at the iPad as a cultural phenomenon.

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. Wikipedia parent finally ditching Godaddy over SOPA support
  2. Torvalds to bad security devs: "Kill yourself now"
  3. 5 ways Avaya can stave off irrelevancy
  4. Researchers can't identify programmers language used in Duqu, ask for help
  5. Windows 8 mobiles may top iPad 3 for business deployment
  6. First look at the new iPad: What's new, unchanged and still missing
  7. Why the hold outs aren't buying an iPad 3
  8. Patch Tuesday: Microsoft to release 6 patches, 1 critical
  9. New Cisco servers have Intel Xeon E5 inside
  10. Microsoft drops the hammer on OnLive's iPad offering

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: