Search This Blog

Tuesday, January 22, 2013

Google looks to kill passwords, but experts say not so fast

  Researchers find critical vulnerabilities in Java 7 Update 11 | Doubt cast on the security of Kim Dotcom's Mega service
 
  Network World Security

Forward this to a Friend >>>


Google looks to kill passwords, but experts say not so fast
While passwords security is not ironclad, experts say they need to be in the mix with device-assisted authentication as an additional layer Read More


WHITE PAPER: Pkware, Inc.

Controlling the Risks and Costs Surrounding Dormant VMs
Explore the security and compliance vulnerabilities presented by dormant virtual machines. This whitepaper defines the risks of dormant VMs, and explores best practices for compliance and the secure management of a virtual environment. Learn More.

WHITE PAPER: Trusteer

Dealing with Advanced and Targeted Attacks
This whitepaper explains how advanced malware challenges traditional defenses to take advantage of the increased exposure of employee endpoints. It reviews the evolution of advanced targeted attacks and the various approaches used to address them. Learn More.

Researchers find critical vulnerabilities in Java 7 Update 11
Researchers from Security Explorations, a Poland-based vulnerability research firm, claim to have found two new vulnerabilities in Java 7 Update 11 that can be exploited to bypass the software's security sandbox and execute arbitrary code on computers. Read More


WEBCAST: PhoneFactor

Strong Security for Remote Workers Is Just a Phone Call Away
Join Steve Dispensa, PhoneFactor Chief Technology Officer, and Sarah Fender, PhoneFactor Vice President of Marketing & Product Management, to learn how phone-based authentication is helping companies tackle complex authentication challenges. Learn More

Doubt cast on the security of Kim Dotcom's Mega service
Kim Dotcom's bold new venture, the file-storage and sharing service Mega, is drawing criticism as security researchers analyze how the site protects users' data. In short, they advise: don't trust it. Read More


WEBCAST: CDW Corporation

Unified Threat Management: A Better Approach to Security
In this Webcast you will learn how Unified Threat Management (UTM) combines firewall, IPS, Web filtering, antivirus and more in a single box to combat a broad range of threats efficiently and economically. Learn More.

Testing The Privacy Company Mega: 50GB free storage, 2048-bit encrypted protection
Kim Dotcom's new end-to-end encrypted file storage and sharing service, Mega is being billed as The Privacy Company that "provides robust cloud storage with convenient and powerful always-on privacy. MEGA believes in your right to privacy and provides you with the technology tools to protect it. Read More

Security researchers cripple Virut botnet
Many of the domain names used by a cybercriminal gang to control computers infected with the Virut malware were disabled last week in a coordinated takedown effort, Spamhaus, an organization dedicated to fighting spam, announced Saturday. Read More

Security Holy Grail anyone?
It sometimes feels like the entire planet is working on some sort of security technology to protect the networked world from insiders, outsiders and just plain nasty ne'er do wells. The researchers at the government's "high-risk, high-payoff research" group, Intelligence Advanced Research Projects Activity (IARPA) want to go beyond the mundane security research and development and get right to the... Read More

 
 
 

SLIDESHOWS

9 essential Internet Explorer 10 add-ons
Quality add-ons for Internet Explorer are few and far between.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Tony Fadell on the unique nature of Apple's design process
  2. Truth in IT job postings: What those want ads really mean
  3. RSA: How to steal encryption keys off hardware chips and smart cards
  4. 2013 job watch: Top 11 metro areas for tech jobs
  5. Security Holy Grail anyone?
  6. 'Rogue clouds' giving IT staffs nightmares
  7. Cisco working on an IT simplification platform
  8. Verizon client worker outsourced part of his job to China so he could have more free time
  9. Blogger's request jolts lawmakers into 'emergency' mode
  10. Day after patch, Java zero-day sold to highest bidders
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: