Search This Blog

Tuesday, March 19, 2013

Black Hat Europe: 'Hardening Windows 8 Apps for the Windows Store'

  9 classic hacking, phishing and social engineering lies | Cyber crime punishment questioned by Internet advocacy group
 
  Network World Security

Forward this to a Friend >>>


Black Hat Europe: 'Hardening Windows 8 Apps for the Windows Store'
"Let's face it, there are no really great apps for Windows 8 and the number of trashy apps is also very low compared to the Android and iOS ecosystems," wrote Senior .NET developer Igor Kulman in the Coding Journal. Read More


RESOURCE COMPLIMENTS OF: Infonetics Research

Using DPI and Metadata to Strengthen Cyber Security and SIEM
SIEM makes it possible to discover and contain advanced cyber security threats significantly faster thanks to a new class of DPI probes that provide application intelligence and metadata. To learn about this, join Infonetics Research Mar. 27 for a live, Interactive WEBINAR. Register now!

WHITE PAPER: Moovweb

3 Steps to a Cost-Effective Mobile Strategy
In the new Moovweb white paper, "Creating the Right Mobile Strategy: What You Need to Know Before You Get Started", get the insight you need to make an educated decision on the move to mobile. Read Now!

9 classic hacking, phishing and social engineering lies
Whether it is on the phone, online or in person, here are ten lies hackers, phishers and social engineers will tell you to get what they want Read More

Cyber crime punishment questioned by Internet advocacy group
Digital rights activists are using a recent security breach involving the secretive group Anonymous as an opportunity to rail against a federal anti-hacking law called the Computer Fraud and Abuse Act. Read More

Security blogger's latest whodunit comes with a twist
Security blogger Brian Krebs is used to helping journalists explain the latest hack attack, and there have been plenty lately affecting the likes of Evernote, Twitter, Facebook, Apple and Microsoft. He isn't used to being the story himself. Read More


WHITE PAPER: Aerohive

Wireless LAN: Preferred Enabler of BYOD
Bring Your Own Device (BYOD) and its array of wireless devices is becoming the dominant way workers access corporate networks . And it's forced IT leaders need to reexamine how to best provide secure, reliable and cost-effective wireless network access. Read Now

Internal-use SSL certificates pose security risk for upcoming domain extensions
The practice of issuing SSL certificates for internal domain names with unqualified extensions could endanger the privacy and integrity of HTTPS communications for upcoming generic top-level domains (gTLDs), according to a security advisory from the Internet Corporation for Assigned Names and Numbers (ICANN). Read More

Site hosting leaked celebrity data goes offline
A site that published the private information and credit reports of several celebrities and other public figures last week went offline on Sunday. The last person to have his alleged private information exposed on the site was CIA director John Brennan. Read More

The hot art in the CIA's cool art collection
The CIA has a collection of paintings that depict historic agency actions Read More


WHITE PAPER: InterMapper

8 Factors for Selecting SMB Network Monitoring Software
Small-to-medium size businesses (SMB's) have limited IT staff and budgets, yet they still require a monitoring solution for cost-effective equipment diagnosis to maintain a healthy network. Use the checklist in this whitepaper to evaluate software vendors. Learn More

Chrome OS update fixes security, video bugs
Google has updated Chrome OS to plug some security holes and fix bugs affecting the operating system's ability to play some video content. Read More

Google Chrome: Best security tips for safer browsing
There's a lot to like about Google Chrome's built-in security features. The browser offers unique sandboxing functions and privilege restrictions, and even updates itself in the background to help better protect you from hackers and malware. But like all browsers, Chrome is imperfect, and there are steps you can take to protect it from attack. Here's how to get the most from Chrome's built-in security features, and work around its security shortcomings. Read More

Google pays $40K to 'Pinkie Pie' for partial hack of Chrome OS
Google today said it had paid a researcher $40,000 for a partial exploit of Chrome OS at its Pwnium 3 hacking contest two weeks ago. Read More

 
 
 

SLIDESHOWS

How different tech degrees measure up

Here's our list of lucrative tech degrees, ranked from lowest to highest starting salary.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 3G and 4G USB modems are a security threat, researcher says

2. First look: Samsung Galaxy S 4

3. iPhone 6 rumor rollup for the week ending March 15

9. Belkin closes Linksys acquisition

5. Security appliances are riddled with serious vulnerabilities, researcher says

6. Software-defined networking is a 'limiting vision' says Cisco CTO

7. How 7 strange tech terms got their names

8. 10 trends shaping IT hiring in 2013

10. 'NotCompatible' Android malware rears its ugly head, again

4. Honeypot for phoney waterworks gets hammered on Internet

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: