Search This Blog

Monday, January 07, 2013

Chrome, Firefox, IE to block fraudulent digital certificate

  Thinking of a counterattack? Deception is better, say experts | Mobile devices set to become next DDoS attack tool
 
  Network World Security

Forward this to a Friend >>>


Chrome, Firefox, IE to block fraudulent digital certificate
Google, Microsoft and Mozilla announced on Jan 3 that they are revoking trust in two digital certificates accidentally issued by Turkish certificate authority (CA) TURKTRUST. When you start talking about another CA fiasco, there are many people whose eyes glaze over when reading technical details because they know it's bad, but really have no idea why it is so dangerous for digital certificates that... Read More


WHITE PAPER: SafeNet Inc

Centralized Key Mgmt Is Critical For Storage Security
In this paper, the current storage encryption and key management landscape will be examined, the fallout that has accompanied the swift expansion of these separate and divergent systems will be identified, and the core attributes and requirements for a centralized EKM system will be presented. Learn More

WHITE PAPER: Trusteer

Dealing with Advanced and Targeted Attacks
This whitepaper explains how advanced malware challenges traditional defenses to take advantage of the increased exposure of employee endpoints. It reviews the evolution of advanced targeted attacks and the various approaches used to address them. Learn More.

Thinking of a counterattack? Deception is better, say experts
Security experts say counterattacks are simply asking for more trouble, since they could promote an escalating series of attacks, and it is possible to attack the wrong villain because of the attribution problem. Read More

Mobile devices set to become next DDoS attack tool
Unless mobile device security is vastly improved, smartphones and tablets are expected to become a significant launching pad for distributed denial of service (DDoS) attacks against corporate websites, a research firm says. Read More


WEBCAST: PhoneFactor

Strong Security for Remote Workers Is Just a Phone Call Away
Join Steve Dispensa, PhoneFactor Chief Technology Officer, and Sarah Fender, PhoneFactor Vice President of Marketing & Product Management, to learn how phone-based authentication is helping companies tackle complex authentication challenges. Learn More

Could China blocking VPNs lead to spying on business?
The "Great Firewall of China," designed to prevent its citizens from accessing some overseas content, has apparently undergone an upgrade. Read More

IMAGiNE: Once-prolific movie piracy leader slapped with 5 year prison sentence
The acknowledged leader of once prolific movie piracy group IMAGiNE was sent to prison today for five years, one of the longest sentences ever handed down for criminal copyright infringement. In addition to his prison term, Jeramiah Perkins, 40, of Portsmouth, Va., was sentenced to serve three years of supervised release and ordered to pay $15,000 in restitution. On Aug. 29, 2012, Perkins pleaded... Read More


WEBCAST: CDW Corporation

Unified Threat Management: A Better Approach to Security
In this Webcast you will learn how Unified Threat Management (UTM) combines firewall, IPS, Web filtering, antivirus and more in a single box to combat a broad range of threats efficiently and economically. Learn More.

Symantec links latest Microsoft zero-day with skilled hacker gang
Symantec is crediting a hacker group with an impressive track record as responsible for finding the latest as yet unpatched vulnerability in older versions of Microsoft's Internet Explorer browser. Read More

Ruby on Rails security updates address SQL injection flaw
The developers of Ruby on Rails, a popular Web application development framework for the Ruby programming language, released versions 3.2.10, 3.1.9, and 3.0.18 of the software on Wednesday in order to patch a serious SQL injection vulnerability. Read More

 
 
 

SLIDESHOWS

33 Best & Worst Celebrity Tech Moments of 2012
Playing Steve Jobs, Gaga over social networking and more tech endorsements than you can shake an iPhone at.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Best tech colleges are harder than ever to get in
  2. Google finds unauthorized certificate for google.com domain
  3. Court sides with Amazon regarding Apple's allegation of false advertising
  4. Cisco, others eyeing $3.7 billion SDN market
  5. How long will big-name customers like Netflix put up with Amazon cloud outages?
  6. Cloud computing, mobile ushering in "major shift" for security practices
  7. Gartner: Top 10 cloud storage providers
  8. Microsoft Patch Tuesday: Just two critical fixes but they affect a lot of Windows systems
  9. Technologies to watch 2013: Cisco products, more maturity for SDNs
  10. Cloud security to be most disruptive technology of 2013
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: