Search This Blog

Monday, March 18, 2013

Security appliances are riddled with serious vulnerabilities, researcher says

'NotCompatible' Android malware rears its ugly head, again | Increased spy access to Americans' banking data raises privacy concerns

Network World Security

Forward this to a Friend >>>


Security appliances are riddled with serious vulnerabilities, researcher says
The majority of email and Web gateways, firewalls, remote access servers, UTM (united threat management) systems and other security appliances have serious vulnerabilities, according to a security researcher who analyzed products from multiple vendors. Read More


WHITE PAPER: Moovweb

3 Steps to a Cost-Effective Mobile Strategy
In the new Moovweb white paper, "Creating the Right Mobile Strategy: What You Need to Know Before You Get Started", get the insight you need to make an educated decision on the move to mobile. Read Now!

WHITE PAPER: F5

Scale Your DNS Infrastructure to Protect Your Business
DNS continues to be a tempting target for attackers, and when they succeed in disrupting DNS, all external data center services are affected. This paper helps organizations confronting these growth and security challenges understand how a new, full-proxy architecture for DNS provides a complete solution for global, local, and cloud load balancing. Learn More.

'NotCompatible' Android malware rears its ugly head, again
The "NotCompatible" malware, designed to infect Android devices and turn them into unwitting Web proxies, is suddenly showing a sharp uptick in activity, according to mobile security vendor Lookout. Read More

Increased spy access to Americans' banking data raises privacy concerns
Spy agencies like the CIA and NSA would have access to a database used to fight domestic financial crime under a proposal being drafted by the Obama Administration. Read More


WHITE PAPER: Netscout Systems Inc.

Holistic Service Management is Critical to the Growth of IT
This paper looks at new approaches to service delivery management to allow IT organizations to deliver better service quality, performance and user experience, and to be more predictive with application performance management and network performance management. Learn More.

Hackers can cause traffic jams by manipulating real-time traffic data, researcher says
Hackers can influence real-time traffic-flow-analysis systems to make people drive into traffic jams or to keep roads clear in areas where a lot of people use Google or Waze navigation systems, a German researcher demonstrated at BlackHat Europe. Read More

Apple updates Mountain Lion, patches Safari
Apple yesterday updated OS X Mountain Lion for the first time in six months, patching 14 security vulnerabilities and addressing a host of other issues. Read More


WEBCAST: Ipswitch, Inc. – Network Management Division

VIDEO: Layer 2 Discovery & Asset Reporting
WhatsUp Gold includes Layer 2 discovery as part of the core product bringing you automatically generated Layer 2 topology maps, IT asset reporting, current & historical network documentation, and easy-to-use troubleshooting tools. All of this available within the same interface as all your network management data. View now.

Potential weakness in SSL/TLS security downplayed by certificate group
Claims by a cryptography researcher this week about weaknesses in the RC4 algorithm used in SSL/TLS certificates is being downplayed by the group known as the Certificate Authority Security Council (CASC) which was recently established to address questions on security in this area. Read More

Honeypot for phony waterworks gets hammered on Internet
An experiment in which a Trend Micro researcher set up two instances of an Internet-based simulation of an industrial-control system (ICS) for a nonexistent water-pump facility in rural Missouri found the simulated system was targeted 17 times over about four months in ways that would have been catastrophic if it had been a real waterworks operation. Read More

The 'Minority Report' shopping experience
Everywhere you go these days -- every store, every urban street, every car park, every ATM -- there are video cameras watching where you go and what you do. Just what are "they" (whoever "they" are) doing with all of that video surveillance? Read More



SLIDESHOWS

How different tech degrees measure up

Here's our list of lucrative tech degrees, ranked from lowest to highest starting salary.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Software-defined networking is a 'limiting vision' says Cisco CTO

2. Why VMware's hybrid cloud announcement could be a big deal

3. 28 facts about pi that you probably didn't know

9. Samsung unveils Galaxy S 4 with novel camera design

5. How Indiana tried to redefine pi

6. iPad 5 rumor rollup for the week ending March 13

7. Users flock to Japan student's firewall-busting thesis project

8. Tutorial on using Windows 8

10. Cisco revamps the router

4. Inside Samsung Galaxy S 4's face- and eye-tracking technology


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: