Wednesday, February 13, 2013

Microsoft mega-patch closes critical IE flaws, fixes 57 vulnerabilities

  Symantec SSL certificates feature cryptography 10k times harder to break than RSA-bit key | Sex sites out, IT sites in for cybercrooks planting malware
 
  Network World Security

Forward this to a Friend >>>


Microsoft mega-patch closes critical IE flaws, fixes 57 vulnerabilities
Microsoft patched a whopping 57 vulnerabilities for this February 2013 Patch Tuesday, "coming close to the all-time Patch Tuesday tally of 64 flaws, all patched with fixes in April 2011." You probably recall the critical zero-day hole in Internet Explorer 6, 7 and 8, then the Read More


WHITE PAPER: Dell SonicWall

A New Set Of Network Security Challenges
IT faces conflicting mandates from the business. On one hand, employees demand access from devices beyond the firewall such as smartphones, tablets, home PCs and laptops. On the other hand, risk management dictates corporate data must remain protected. The overarching challenge: balance productivity and security. A Must Read!

WHITE PAPER: HP, Microsoft & Intel

Easing the Online Overload
Many transaction processing systems have reached their capacity limits, so the time is right to consider the potential for running tier 1 mission-critical workloads on opens standards. This white paper highlights the key components of a properly structured and highly optmized SQL Server OLTP reference architecture. Read Now!

Symantec SSL certificates feature cryptography 10k times harder to break than RSA-bit key
Symantec today began offering multi-algorithm SSL certificates for Web servers that go beyond traditional crypto to include what's known as the Elliptic Curve Cryptography (ECC) Digital Signature Algorithm (DSA), which the firm says will be 10,000 times harder to break than an RSA-bit key. Certificates are used to prove site identity to the visitor through a validation check that involves the user's browser and the site certificate, and Symantec is making the argument that authentication will happen faster using this particular ECC algorithm. Read More

Sex sites out, IT sites in for cybercrooks planting malware
It's long been a tactic by cybercriminals to load up compromised websites with malware-laden links to snare victims, but instead of it being the sex sites as of old, the favored type of website now is for information technology, according to analysis in the Websense threat report out today. Read More

Obama cybersecurity order lacks bite, security experts say
President Barack Obama's cybersecurity executive order elicited guarded praise from several quarters even as it revived calls for more comprehensive bipartisan legislation to address long-term security threats. Read More

Bit9 hack casts spotlight on security industry practices
By confessing that its mistakes led to security breaches at three customers, Bit9 has sparked debate over whether the industry is ready to block hackers that see vendors as the door to other companies. Read More


WHITE PAPER: F5

Vital Security Strategies for Microsoft Exchange
The demand for access to email anytime, anywhere, from any device makes it critical for IT to ensure Microsoft Exchange deployments are secure, fast, and available. Learn about vital security requirements every Exchange environment should have in place to improve security and availability for Exchange. Read Now.

Retailers a prime target for cyber criminals in '12, says Trustwave
Retailers have become prime targets for cyber criminals, according to a report released Tuesday by Trustwave. Read More

Earth-buzzing asteroid could be worth big bucks: $195B if we could catch it
The asteroid NASA say is about the half the size of a football field that will blow past Earth on Feb 15 could be worth up to $195 billion in metals and propellant. That's what the scientists at Deep Space Industries, a company that wants to mine these flashing hunks of space materials, thinks the asteroid known as 2012 DA14 is worth - if they could catch it. [RELATED: The sizzling world of asteroids]... Read More

UEFI secure boot fix released for Linux
After just a few months of development, users finally have an official way to run Linux on machines using Windows 8's UEFI secure boot framework. Read More

New FIDO Alliance pushing 'fast-identity' strong authentication protocol
A new industry group called the Fast IDentity Online Alliance, or FIDO Alliance for short, makes its debut Tuesday to promote adoption in e-commerce and websites an innovative authentication protocol that's intended to bring a higher level of security for online users. Read More


WHITE PAPER: Fiberlink Communications

Mobile Device Management Policy Best Practices
Managing smartphones and tablets is only half the MDM story. Securing the data and access points between corporate systems and your workers' iOS, Android, Windows, and BlackBerry devices requires just as much consideration and planning as protecting the devices themselves. Learn More

Startup Nok Nok Labs pitches strong new authentication process
Nok Nok Labs officially opened its doors today to introduce client/server-based technology proposed as an innovative foundation for flexible, strong multi-factor security that can be used in e-commerce, Web services or the enterprise. Read More

Mobile malware still small, but 'malnets' to rise up
Mobile device operating systems are still more secure than those of desktop or laptop computers. But today's mobile spam and phishing attacks will increasingly be delivered via mobile malware networks. Read More

Hacker arrested after taunting police with clues attached to cat
Japanese police believe they have finally caught the man behind an extraordinary malware campaign that included taunting police in January by sending them clues on an SD card strapped to a cat. Read More

12 enraging Office 2013 flaws -- and how to fix them
A step-by-step guide to exorcising the new demons in Microsoft Office 2013 Read More

 
 
 

SLIDESHOWS

12 hybrid cloud security products to watch

Here are 12 security products that you can buy for your hybrid cloud whether they run on premise, in the cloud or a little of both.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Bill Gates proves he's Bill Gates .. to Reddit's satisfaction

2. VMware's problems are deeper than just Microsoft

3. iPhone 6 rumor rollup for week ending Feb. 8

4. Feds offer $20M for critical energy network cybersecurity tools

5. Windows 8 Surface Pro sells out quickly. Was that on purpose?

6. 10 Cisco partners you should get to know

7. Cisco vs. Juniper: How different are their SDN strategies?

8. 12 hybrid cloud security products to watch

9. Google pays Apple $1bn a year to be iOS search engine default

10. Hacker arrested after taunting police with clues attached to cat

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment