Search This Blog

Monday, June 04, 2012

Flame's Bluetooth functionality could help spies extract data locally, researchers say

Anonymous Claims Attack on Facebook | Sanitize Office: How to remove personal metadata

Network World Security

Forward this to a Friend >>>


Flame's Bluetooth functionality could help spies extract data locally, researchers say
The Bluetooth functionality of the Flame cyberespionage malware could potentially be used to pinpoint the physical location of infected devices and allow local attackers to extract data if they get in close proximity to the victims, according to security researchers from antivirus vendors Symantec and Kaspersky Lab. Read More


WHITE PAPER: Quest Software

Want to Make Compliance Easy? Get Proactive!
Is your business reactively implementing compliance? If so, you're wasting time and money and destroying productivity. Get proactive! Read now!

WEBCAST: IBM

Delivery Management -- Extending Lifecycle Management
Date: Wednesday, June 20, 2012, 1:00 PM EDT Hear from application lifecycle management experts how to increase delivery efficiency and effectiveness with a new approach to Delivery Management. Register Now

Anonymous Claims Attack on Facebook
The notorious hacker collective Anonymous is claiming responsibility for sporadic service failures around the world at Facebook on Thursday evening. Read More

Sanitize Office: How to remove personal metadata
Yesterday Microsoft announced Office 365 for Government. Since "security and privacy play a big role in any decision to move to the cloud," the feds' version will reside on separate servers than from the standard Office 365 users. Read More

U.S. and Israel unleashed Stuxnet, says New York Times
A New York Times report this morning appears to confirm what has long been suspected by many: that the United States and Israel were responsible for the Stuxnet cyber attack against Iranian nuclear facilities. Among the story's key points: Read More

Security: Prepared for the EU's New Data Protection Regulation?
As the U.K. prepares to begin enforcing its version of the European Union's E-Privacy Directive later this week, the 27-member nations of the E.U. are considering new draft legislation that would reform and harmonize data protection laws. Read More


WHITE PAPER: Fortinet

Next-Generation Security for Enterprise Networks
Since the concept of a 'next-generation firewall' was introduced several years ago by Gartner, many network security vendors have introduced their own next-generation firewalls to address this product category - but with varying results. View Now

Big Brother's Mining Our Data, Do We Care?
CIO magazine Editor in Chief Maryfran Johnson considers our June 1 cover story on Equifax's new business strategy, which involves massive amounts of consumer and business data. Gen Y is at the edge of a brand new world devoid of privacy. Do they care? Read More

Ensuring that mobile applications are truly secure, part 2
The digital forensics and security consulting firm viaForensics just published a report that outlines 40 best practices for developing secure mobile applications. This free report is based on the company's expertise in testing hundreds of mobile apps for vulnerabilities. See what viaForensics has to say about your favorite mobile apps. Read More

An assessment of how the US government is trying to improve security
The mood of the American people is changing, and changing fast. The president has recognized this and, while some may complain about the treatment of Bradley Manning, the WikiLeaks criminal, most are fed up to the teeth with the chaos which cybercriminals and hackers are visiting upon us. Read More

Browser feature can be abused to misrepresent download origin, researcher says
Legitimate browser functionality can be abused to trick users into believing that a trusted website has asked them to download a file, which is actually being served from a rogue server, Google security engineer Michal Zalewski demonstrated on Tuesday. Read More


RESOURCE COMPLIMENTS OF: IT Roadmap Denver

Your IT Career Roadmap
This unique session is designed with you, the IT professional in mind. How can you build your personal brand, and properly design a career plan? How do you work with your staff to create a plan that retains your best talent? Come to IT Roadmap Denver for valuable information on how today's IT leaders build successful careers. Click to continue

IT staff, engineers among top 10 toughest jobs to fill in US
Forty-nine percent of US companies are having a hard time filling what workforce management firm ManpowerGroup calls mission-critical positions within their organizations with IT staff, engineers and "skilled trades" among the toughest spots to fill. Read More

10 Mobile Device Management Apps to Take Charge of BYOD
Managing devices in a BYOD environment is no mean feat, and the right mobile device management (MDM) product can be a key component in making it work. Here are 10 leading MDM products on the market today. Read More

Is RIM ruined?
Bad news keeps piling up on RIM, but it wasn't always that way Read More

The 20 best iPhone/iPad games of 2012 so far
Angry Birds Space isn't the only iPhone/iPad game in town! Read More



SLIDESHOWS

10 terrific LTE smartphones for $150 or less
LTE on the cheap: Offerings from Apple, Samsung, Nokia and more make cut.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. U.S. and Israel unleashed Stuxnet, says New York Times
  2. Is RIM ruined?
  3. Why F5 beats Netscaler ... and the rest of the competition
  4. U.S. warns users of new Citadel ransomware hit
  5. The 20 best iPhone/iPad games of 2012 so far
  6. Flame malware: All you need to know
  7. Flame malware: All you need to know
  8. Iran's discovery of Flame malware turning into political hot potato
  9. Open source BlackBerry: RIM's last resort
  10. IT staff, engineers among top 10 toughest jobs to fill in U.S.

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: