Search This Blog

Friday, June 22, 2012

Flame was intelligence-gathering tool for Stuxnet

Hackers exploit Windows XML Core Services flaw | More On The Security Skills Shortage Issue

Network World Security

Forward this to a Friend >>>


Flame was intelligence-gathering tool for Stuxnet
The Flame cyber-weapon was part of an intelligence-gathering operation designed to aid separate more physically disruptive attacks, the Washington Post has reported anonymous US officials as saying. Read More


WHITE PAPER: MegaPath

6 Best Practices to Ensure a Thorough Evaluation
Identify 6 key situations that demonstrate when it's time to consider managed network services, plus 6 best practices to ensure your evaluation of managed network service providers is thorough enough to support your decision. View Now

WHITE PAPER: Xirrus

Tablets in the Enterprise
Tablets are replacing laptops at lightning speed. Whether company-issued or part of the BYOD phenomenon, the increased use of smart devices has resulted in a dramatic shift in network traffic with an emphasis on wireless. This paper explains how to predict Wi-Fi demands and architect a best-fit wireless network strategy for your environment. Learn more.

Hackers exploit Windows XML Core Services flaw
An unpatched Windows vulnerability considered a critical threat by security experts is being exploited by cybercriminals. Read More

More On The Security Skills Shortage Issue
I frequently peruse information security news, and recently came across this article. The article highlights Symantec CEO Enrique Salem's warning of a shortage of talented cybersecurity professionals in the United States. Furthermore, this shortage is especially pronounced where it may be needed most -- law enforcement, intelligence agencies, and the Department of Defense. Read More


WHITE PAPER: Oracle

Experience a Smooth and Swift Backup
Virtually every company, regardless of size or industry, needs data archive capabilities. Datacenter administrators across all industry segments face similar archive challenges. Learn More!

Defense contracts worth billions cover network operations, cyberthreat sharing, Android security
The Defense Information Systems Agency (DISA) this week awarded Lockheed Martin a three-year contract to support operations and security on the Department of Defense global data network. The contract, which could be extended up to four additional years, might reach a potential $4.6 billion over seven years. Read More

Cisco patches vulnerabilities in VPN client, security appliances
Networking equipment vendor Cisco Systems released multiple security updates on Wednesday to address vulnerabilities in its AnyConnect Secure Mobility Client, ASA 5500 Series Adaptive Security Appliances, Cisco Catalyst 6500 Series ASA Services Module and Cisco Application Control Engine (ACE) software. Read More


WEBCAST: IBM

Changing the Competitive Dynamics of the Business
Date/Time: June 5, 2012, 11:00 a.m., EDT, 4:00 p.m. BST / 3:00 p.m. UTC Please join us for this webcast, as Dr. Barry Devlin, Founder and Principal, 9sight Consulting, describes what operational analytics can do for your business and reviews an architectural approach that will enable you to make it a reality. Register Now

NASA revamps, looks to speed high-tech commercialization opportunities
Looking to address harsh criticism from its own inspector general that has been painfully slow in getting important technologies out of the lab and into commercial applications, NASA today said it has opened a revamped Technology Transfer Portal which aims to streamline the way the space agency handles that business. Read More

Fake Android antivirus app likely linked to Zeus banking Trojan, researchers say
A recently discovered fake Android security application is most likely a mobile component of the Zeus banking malware, security researchers from antivirus firm Kaspersky Lab said on Monday. Read More

Should best cybercrime defense include some offense?
A growing number of U.S. companies have concluded that in their battle against hackers, the best defense has to include some offense. Read More



SLIDESHOWS

Cool Summer Gadget Guide
Here are some suggestions for some great summer gadgets for work, travel, outdoors and exercise that will get you more enjoyment out of the summer season.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Microsoft previews Windows Phone 8
  2. Microsoft, Google, IBM and Salesforce.com heat up PaaS
  3. Five years later: Do Apple's first ads ring a bell?
  4. Larry Ellison to buy Hawaiian island
  5. Surface vs. iPad: The weight of the world on Microsoft
  6. Review: Samsung Galaxy S III smartphone
  7. Young employees say BYOD a 'right' not 'privilege'
  8. The worst data breach incidents of 2012 - so far
  9. Juniper confines SDNs to data center
  10. 10 things we like about Ubuntu Linux 12.04

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: