Search This Blog

Tuesday, March 20, 2012

Stolen encryption key the source of compromised certificate problem, Symantec says

Malicious Web Apps: How to Spot Them, How to Beat Them | Secret Service takes out "astonishing" cyber theft ring

Network World Security

Forward this to a Friend >>>


Stolen encryption key the source of compromised certificate problem, Symantec says
When Kaspersky Lab last week spotted code-signed Trojan malware dubbed Mediyes that had been signed with a digital certificate owned by Swiss firm Conpavi AG and issued by Symantec, it touched off a hunt to determine the source of the problem. Read More


WEBCAST: Mitel

Real World Perspectives from Real World Practitioners
Join your peers as they discuss Unified Communications and their move to voice virtualization—the business drivers behind their decisions, the benefits they've received and the best practices they've learned along the way. It's a must-see event for joining voice and data on a single virtualized infrastructure. Learn More

WHITE PAPER: SonicWALL

Smart Security for Escalating Challenges
This eBook examines how CSOs and IT managers are solving these issues using next-generation firewalls. Read now.

Malicious Web Apps: How to Spot Them, How to Beat Them
Web apps are great. They're available for use virtually anywhere, anytime, from practically any device that has a Web browser. Web apps are also easy to update and maintain: The developer tweaks the app on the Web server, and everyone who uses it has access to the latest version. Read More

Secret Service takes out "astonishing" cyber theft ring
The U.S. Secret Service, teamed with Immigration and Customs Enforcement to arrest 19 people the agencies said operated a cyber crime ring that specialized in identity theft and counterfeit credit card trafficking. According to the Secret Service the group operated on multiple cyber platforms and members bought and sold stolen personal and financial information through online forums, particularly Carder.su.... Read More

Smart Access Control with Apache
Learn how to employ some of Apache's most useful and effective modules to restrict access to your Apache-powered website. Read More


WHITE PAPER: Oracle

Access to Sensitive Application Data
In this hands-on review, the SANS Institute Analyst Program examines Oracle Database Vault, which provides the capability to limit access of privileged users and DBAs to critical data and actions. Learn More!

Judge stands up for commonsense privacy law in cellphone case
Bravo to the Texas judge who ruled that if the government wants 60 days of cellphone location records in a criminal investigation it must first obtain a warrant after showing probable cause. The Electronic Frontier Foundation has details here: Read More

Blue Coat unifies security reporting in cloud service, appliances
Blue Coat Systems today said it's unified the real-time reporting in its cloud-based security service with that in its full line of ProxySG security appliances so that enterprises receive real-time information related to both. Read More

How GSA is securing its cloud apps
As the General Services Administration (GSA) migrates to a work-anywhere, work-anytime strategy, the real estate arm of the U.S. federal government is discovering that having an iron-clad security strategy is critical to its adoption of cloud-based applications. Read More


WHITE PAPER: Tripwire

Responding to New Threats in More Complex IT Environments
As organizations today face the challenge of protecting their valuable data, they must balance that protection with giving business users and customers access to the data. Learn More!

MDM: Part of the mobile security solution?
The good news for enterprises: Mobile devices are packed with power. A new iPhone is 100 times lighter, 100 times faster, and 10 times less expensive than the luggable notebooks of the early 1980s. Read More

Cloud-based single sign-on: A business perk for customers?
As companies sort out their cloud strategies, some are finding cloud-based single sign-on (SSO) can be a high-tech "perk" for customers. Read More

Duqu trojan built by 'old school' programmers, Kaspersky says
The Duqu Trojan, an espionage tool that last year attracted lots of attention for its many Stuxnet-like features, may have been written by experienced old school programmers, a security researcher at Kaspersky Labs said Monday. Read More

CIA wants to spy on you through your appliances
You know how sometimes you hunt for an item that you have misplaced? A really cool aspect of the 'Internet of Things' could allow you to ask, What did I do with my remote control? The computer could tell you precisely where it is. What did I do with my book? You might get an answer like, It's at Tom's house on his coffee table. Now think about the bigger picture and combine the Internet of Things with... Read More



SLIDESHOWS

Useful security threat data advisory tools
Check out these browser-based tools to keep up on the latest cyber security threats.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. 'Big data' creating big career opportunities for IT pros
  2. Don't wait on this patch, Microsoft says
  3. Techie business cards
  4. Cisco incubating software-defined network startup?
  5. iPhone 5 rumor rollup
  6. Microsoft's MAPP reportedly hacked
  7. How to get a hot job in big data
  8. Apple announces dividend and stock buyback plans
  9. Soon after release, latest iPad model is jailbroken
  10. New iPad wins rave reviews

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: