Search This Blog

Wednesday, February 20, 2013

Quick look: Did China’s army hack US companies?

  Watch a Chinese military hacker launch a successful attack | 13 of the biggest security myths busted
 
  Network World Security

Forward this to a Friend >>>


Quick look: Did China's army hack US companies?
Security firm Mandiant says that for past seven years a group inside China's People's Liberation Army hacked 141 companies. Read More


WHITE PAPER: F5 Networks

Solving Substantiation with SAML
Read this paper to learn how F5 uses SAML to effectively enable secure web domains to exchange user authentication and authorization data, providing users of web browsers with single sign-on (SSO) convenience they need. Learn More!

WHITE PAPER: McAfee

Next Generation Network IPS
This paper discusses the six critical management capabilities of next-generation IPS solutions to help reduce operational overhead while unifying across multiple environments, streamlining security operations and protecting against targeted threats. Read Now

Watch a Chinese military hacker launch a successful attack
Thanks to cybersecurity firm Mandiant, we now have a video of a hacker believed to be linked to the Chinese military infiltrating and stealing files from unidentified English language targets. The video comes as part of Mandiant's 60-page report, first reported by the New York Times, that claims China's military is responsible for cyberattacks on more than 140 foreign businesses, many of which are... Read More

13 of the biggest security myths busted
13 myths about information-technology security you'll hear but should you believe? Read More

Oxford University briefly blocks Google Docs in anti-phishing effort
Blamed 'persistent failures' by Google to stop abuse, but removed block after two hours Read More


WHITE PAPER: Symantec

Is Online Backup Right For Your Business?
Read this whitepaper to find out how cloud-based hybrid backup offers significant cost savings, to small and medium-size businesses, as well as flexible options designed for agility, and a workforce that is free to focus on the company's core offering. Read Now!

Apple victim of malware attack
Apple on Tuesday said it was a victim of a malware attack when a small number of systems inside the company were compromised. Read More

Mozilla changes policy to limit risk of subordinate CA certificate abuse
Mozilla is taking steps to limit the risk of powerful subordinate Certificate Authority (CA) certificates falling into the hands of attackers and potentially being used to issue rogue certificates for use in SSL snooping attacks. Read More

Twitter calls for smarter password habits following Jeep, Burger King hacks
Twitter is urging its account holders to be smarter with their passwords following two recent attacks by hackers directed at Burger King and Jeep that took control of those accounts. Read More


WHITE PAPER: Fiberlink Communications

Achieving True Enterprise Mobility
Download MDM Is Only Half the Battle from CITO Research to learn the tenets of effective Mobile Device Management (MDM) and the need for the same conversations to take place around Mobile Application Management. Learn More

Kaspersky apologizes for antivirus update that continues to disrupt customer nets
Kaspersky Lab's flawed anti-malware update that went out Feb. 5 for the Kaspersky Endpoint Security product continues to cause serious disruptions in enterprise networks. Read More

Critical infrastructure protection: Maybe thinking good thoughts will make us safe
Joe Lieberman (I-Conn.) retired in January after quite a colorful two-dozen years in the U.S. Senate. One of the major issues he pushed for during his last few years in office was protection of the U.S. critical infrastructure. Along with Sen. Susan Collins (R-Maine), Lieberman put forth a series of bills aimed at requiring some level of protection for such infrastructure, the last of these being voted down in November. Read More

Meet Mandiant, the company pulling the covers off alleged Chinese hackers
This week's exposing of a cybersecurity threat group linked to China's People's Liberation Army has thrust Mandiant, the source of a self-described "unprecedented report" and a video about the cyber-espionage campaign, into the security spotlight. Read More

Startup spins up identity and access-control cloud service
Startup StormPath makes its debut today with an identity and access-control cloud-based service primarily intended for use by software development teams that are building web applications. Read More

Drones still face major communications challenges getting onto US airspace
Communications and effective system control are still big challenges unmanned aircraft developers are facing if they want unfettered access to US airspace. Read More

 
 
 

SLIDESHOWS

13 of the biggest security myths busted

13 myths about information-technology security you'll hear but should you believe?

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 13 of the biggest security myths busted

2. New report says cyberspying group linked to China's army

3. Google retail stores could be a smart move, analysts say

4. How BlackBerry recreated the mobile user experience with Z10

5. Microsoft's Outlook.com comes out of preview phase

6. Career advice that will change your life

7. Galaxy S IV design reportedly finalized, along with pint-sized variant

8. Source code to original Adobe PhotoShop released

9. The Samsung Galaxy S 4 shows up in New Zealand, and on an AT&T fact sheet

10. Flip side to Burger King Twitter hack: Many new followers

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: