Search This Blog

Friday, March 16, 2012

Advanced tech conflict: China's rare earth stranglehold

40% of U.S. government Web sites fail security test | We need good code, says Whitfield Diffie

Network World Security

Forward this to a Friend >>>


Advanced tech conflict: China's rare earth stranglehold
The battle over access to rare earth materials, critical components of all manner of advanced technologies from smartphones and computers to aircraft and cars, raged again this week as the United States, Europe and Japan joined forces to challenge China's restrictions on exports of the metals. The crux of the situation: China controls some 95% of the world's rare earth materials and sets prices and access to the materials willy-nilly and of course has threatened to cut off access to the stuff at the drop of a hat. The U.S. and Australia have begun mining rare earth materials but they are years away from equaling China's production. So the battle rages. Here's a look at the conflict. Read More


RESOURCE COMPLIMENTS OF: Microsoft

Try Microsoft Office 365, free
Collaborate in the cloud with Office, Exchange, SharePoint, and Lync videoconferencing. Access, edit, and share documents. Starting at $8/user/month. Try it free.

WHITE PAPER: IBM

Best Practices to Architect Applications in the IBM Cloud
It's clear that cloud environments are a great way to deliver software—but what are the best ways to use it really well? Read this report to learn how to leverage cloud environments, design applications for successful cloud-based deployments and safeguard your virtual machines. Read Now

40% of U.S. government Web sites fail security test
Approximately 40% of federal government agencies are out of compliance with a regulation that requires them to deploy an extra layer of authentication on their Web sites to prevent hackers from hijacking Web traffic and redirecting it to bogus sites. Read More

We need good code, says Whitfield Diffie
AMSTERDAM (03/14/2012) - Cryptographer Whitfield Diffie reckons one of the most important things for good cryptography and security in the age of the Internet is good code. Unfortunately, really good code is generally too expensive to write, he said at the Black Hat Europe conference. Read More

How to attract the military's rapt attention: Sell fake service-related documentation on the Internet
The military has a special place reserved on the tip of their bayonets for the folks who think they can sell phony honorable discharge documents and military awards like the Purple Heart. Today the Department of Justice said that Robert Neener of Smithville, Tennessee, plead guilty to possessing and selling federal agency seals and pretending to be a federal officer or employee while operating an Internet... Read More


WHITE PAPER: GFI Software

GFI VIPRE Antivirus Business 5.0
This free fully-functioning 30-day trial of GFI VIPRE Business is designed to optimize overall performance by melding antivirus and antispyware together into one powerful engine. Learn More

CIA director tells a funny computer engineering joke
Had to pass this one along. Seems CIA Director David Petraeus made an amusing computer engineering joke to start of his speech at the recent In-Q-Tel CEO Summit. It goes like this: Read More

Iran gets cut off from major international financial system
The international payments system SWIFT today said it is disconnecting all communications services to Iranian financial institutions in support of a new European Council sanctions against the country over nuclear threat concerns. Read More

In new attack on mobile handsets, fraudsters target one-time passwords
Two online banking fraud schemes are designed to defeat the one-time password (OTP) authorization systems used by many banks. Read More


WHITE PAPER: SonicWALL

Smart Security for Escalating Challenges
This eBook examines how CSOs and IT managers are solving these issues using next-generation firewalls. Read now.

It's Time For An Enterprise Encryption Strategy
A few years ago, I began writing and talking about data encryption management problems on the horizon. I was right about the issues but a bit aggressive on the timing. Based on what I'm seeing lately however, the encryption management sky may finally be falling (or at least starting to fall). Read More

Android pattern lock stumps FBI
The FBI is seeking a warrant to compel Google to unlock an Android phone that was confiscated from an alleged pimp. Read More

18 firms sued for using privacy-invading mobile apps
Facebook, Apple, Twitter, Yelp and 14 other companies have been hit with a lawsuit accusing them of distributing privacy-invading mobile applications. Read More

Digitally signed malware is increasingly prevalent, researchers say
Security companies have recently identified multiple malware threats that use stolen digital certificates to sign their components in an attempt to avoid detection and bypass Windows defenses. Read More



SLIDESHOWS

Useful security threat data advisory tools
Check out these browser-based tools to keep up on the latest cyber security threats.

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. Judea Pearl, a big brain behind artificial intelligence, wins Turing Award
  2. 10 ways to celebrate Pi Day
  3. Microsoft: Don't hate on IE 10
  4. Apple joins iPad trade-in bandwagon, offers competitive deals
  5. A look at China's cyberwar planning
  6. Alcatel-Lucent switch pushes Cisco, HP at the edge
  7. Looking for stolen iPad, police find 750 pounds of Meth
  8. Talent pool not big enough to meet cloud computing job demand
  9. Cisco rolls out its next generation fabric computing
  10. Indiana turns up 100G Ethernet research net

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: