Monday, September 24, 2012

IBM cyber security watchdogs see increase in browser exploits and encryption abuse

  Senator takes cybersecurity law fight to CEOs | Anonymous spokesman's YouTube meltdown led to arrest
 
  Network World Security

Forward this to a Friend >>>


IBM cyber security watchdogs see increase in browser exploits and encryption abuse
IBM's security watchdogs said their research shows a big increase in browser-related exploits, renewed concerns around social media password security and challenges with securing mobile devices, especially in a corporate setting. Read More


WHITE PAPER: Sourcefire, Inc.

The Sourcefire FireAMP Vision
Still getting malware infections despite the time and money you've spent on security? Today's malware defenses have an inherent disadvantage in fighting today's threats. Designed for another time they are burdened with legacy constraints that hamper performance and protection. Learn More

WEBCAST: Webroot Software

Try the fastest business security ever.
Online security is an increasing risk for businesses, but what is the best solution? Cloud-based SaaS security is an emerging trend for organizations looking to address today's security reality. Learn about the cloud-based SaaS security. Learn More.

Senator takes cybersecurity law fight to CEOs
Sen. Jay Rockefeller (D-WVa.) hopes cybersecurity legislation can be revived in Congress by avoiding "the filter of beltway lobbyists," and connecting directly with top business leaders. But critic say he could have done so long ago. Read More

Anonymous spokesman's YouTube meltdown led to arrest
If anybody was surprised at the arrest in Dallas last week of Barrett Brown, self-described sometime spokesman for the hacktivist group Anonymous, it should not have been Brown himself. Read More


WHITE PAPER: McAfee

What's Holding Back the Cloud?
This report captures key findings from a blind survey of 800 IT professionals in four countries — China, Germany, the United Kingdom and the United States — that provide insight into cloud computing security concerns, and how those concerns might be alleviated. Learn more in the McAfee Securing Cloud-Based Services KnowledgeVault. Learn more.

What to learn from the $10 million Subway POS hack
Two Romanian hackers will serve time for targeting Subway in a $10 million point-of-sale conspiracy involving 150 restaurants in 2011. Read More

Hackers exploit 0-day: Kick IE to the curb or catch a nasty Poison Ivy itch?
Do you use Internet Explorer 6, 7, 8 or 9? If so, then you might catch a nasty itch since malicious hackers are using those IE browsers "to install the Poison Ivy Trojan—malware that can steal data or take remote control of PCs," the BBC warned. This new zero-day can potentially infect "hundreds of millions" of IE browsers. Read More


WHITE PAPER: Dell and VMware

Cloud Control: Meet the Challenges Head-On
Looking for the "On" switch for your cloud computing deployment? Right. While Cloud Computing is the gateway to business flexibility and agility, there's no "On" switch. There's no "right" way. The benefits of cloud hold tremendous promise, and challenges abound. Learn More

Researchers hack iPhone, steal data
Researchers have broken into an iPhone 4S running the latest version of Apple iOS, making it possible to exploit the same vulnerability in the iPhone 5 that is set for release on Friday. Read More

iPhone 5 thieves break into mobile shops in Japan hours before launch
Thieves broke into a number of mobile phone shops across central Japan and stole hundreds of iPhone 5 handsets hours before the device went on sale Friday morning, police said. Read More

Ig Nobels feature exploding colonoscopies, bureaucracy, and why leaning to the left makes the Eiffel Tower seem smaller
The Ig Nobel Prize ceremony has honored a wide array of strange research and advancement over the years, from exploding pants to woodpecker headaches to aggressive parking enforcement, and Thursday night's ceremony in Cambridge, Mass., was no exception. Read More

 
 
 

SLIDESHOWS

TEST: 6 free email servers for small businesses
hMailServer (Windows only) wins our test; Citadel (Linux only) comes in a close second

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. 2012 Ig Nobel Prizes honor real, but offbeat research
  2. Microsoft to release IE update for critical vulnerabilities on Friday
  3. Sophos admits bad update slamming its anti-virus software customers
  4. Latest Hit Man scam takes a darker tone
  5. iOS 6 Wi-Fi glitch a Web problem, not firmware issue
  6. Cisco's exit from ADCs should come as no surprise
  7. Weighing Windows Phone 8's chances now that it's reached RTM
  8. Cisco looks to one-up Arista, Juniper with Nexus 3548
  9. The 10 most common mobile security problems and how you can fight them
  10. Kaspersky researcher cracks Flame malware password
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment