Search This Blog

Monday, January 28, 2013

Backdoor accounts found in networking and security appliances from Barracuda Networks

  Android malware potentially stole up to 450,000 pieces of personal data: Symantec | How to clean up your business's online reputation
 
  Network World Security

Forward this to a Friend >>>


Backdoor accounts found in networking and security appliances from Barracuda Networks
A variety of networking and security appliances from Barracuda Networks contain backdoor accounts that could allow attackers to log in remotely over SSH (Secure Shell) and gain administrative, or root, access on the devices. Read More


RESOURCE COMPLIMENTS OF: SolarWinds

Get Firewall Security Manager to Fix Your Security Rule Gaps
Managing and making changes to your firewall is easier than ever with SolarWinds® Firewall Security Manager (FSM). SolarWinds FSM simplifies firewall troubleshooting and change management for your multivendor, Layer 3 network devices. Find and fill gaps in your security rules! Get SolarWinds® Firewall Security Manager to find and fill gaps in your security rules! Download a free, fully functional 30-day trial and start managing your firewalls in less than an hour. Try it today!

RESOURCE COMPLIMENTS OF: IDG Research

New Survey: Purchase Process of Enterprise Technologies
Tell us about the buying process for enterprise technologies in Network World's Technology Influence Survey! This survey should take about 10 minutes of your time. To thank you, you will have the opportunity to enter a sweepstakes to win a $250 cash prize*! Please be assured your responses are confidential. To participate, click on the link below. *Due to regulations, prize sweepstakes is only open to legal U.S. and Canadian (except Puerto Rico and Quebec) residents, age 18 or older.

Android malware potentially stole up to 450,000 pieces of personal data: Symantec
A fake app store that steals personal information on Android devices may have potentially stolen between 75,000 and 450,000 pieces of personal data such as contact details, according to security firm Symantec. Read More

How to clean up your business's online reputation
Keeping tabs on yourA company's online reputation is one thing. But angry customers trash-talking your business can sabotage your good name overnight. It's no easy task to minimize the damage done from the Web equivalent of the slam book. Read More

Celebrating doomsday past and future
A look at a couple other doomsday options and how people celebrated the last one. Read More


WEBCAST: PhoneFactor

Strong Security for Remote Workers Is Just a Phone Call Away
Join Steve Dispensa, PhoneFactor Chief Technology Officer, and Sarah Fender, PhoneFactor Vice President of Marketing & Product Management, to learn how phone-based authentication is helping companies tackle complex authentication challenges. Learn More

Weird and wonderful high-tech inventions of the world
From robotic waiters and high-tech bicycles to "privacy visors," we take a look at recent inventions that are strange but beautiful Read More

Employees put critical infrastructure security at risk
Critical infrastructure providers' worst security vulnerability may be their employees. That's the takeaway from two reported incidents where IT systems connected to key energy industry assets were found to be infected with malware deployed using infected USB drives. Read More

"Hammered asinine requirements": Now there's a secure password
You're best off forgetting your grammar lessons when it comes to creating passphrases, according to new research out of Carnegie Mellon University and MIT. Read More


WHITE PAPER: Quest Software

The Right Way to Prove Identity and Establish Trust
Right now, someone's logging into your network and accessing proprietary data. Do you know who it is? Ensuring the identity of the person(s) trying to access your network is harder than ever. This Quest technical brief explains why two-factor authentication is superior to password authentication. Read Now!

Symantec streamlines software lines
Security software provider Symantec is reworking its sales strategy, reorganizing software lines, slimming middle management and increasing marketing and research efforts. Read More

Facebook's Graph Search worries security experts
Post highlighting embarrassing things raises questions of user privacy with Graph Search, which Facebook users cannot opt out of Read More

Two former Anonymous members jailed in UK for PayPal, Visa DDoS attacks
Three men were sentenced Thursday in the U.K. for their roles in a series of distributed denial-of-service (DDoS) attacks launched against financial and music industry organizations in 2010 by the Anonymous hacktivist collective. Read More

How to Spot a Social Media Scam
Social networking sites such as Facebook and Twitter are breeding grounds for phishing, clickjacking and social engineering attacks. Here are nine tips for spotting a scam, plus advice for what to do if you fall victim. Read More

 
 
 

SLIDESHOWS

Microsoft Office Web Apps v. Google Docs
5 reasons why Google Docs is better/5 reasons why Web Apps is better.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. First-look clip of Ashton Kutcher as Steve Jobs
  2. Symantec CEO on reorg: "our system is just broken"
  3. Cisco to sell Linksys home networking business to Belkin
  4. Ex-Cisco engineers tackle Layer 4-7 SDNs
  5. Backdoor accounts found in networking and security appliances from Barracuda Networks
  6. Cisco gets closer to NetApp, further from VCE
  7. Windows 8 "a much deadlier assault weapon" than Windows 7
  8. Open source software vs. business models
  9. Q&A: What the FCC's Wi-Fi expansion means for you
  10. 13 markets you might not associate with Cisco
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: