Search This Blog

Friday, May 10, 2013

Adobe warns customers of unpatched critical flaw in ColdFusion

  Lesson from the Google office hack: Do not trust third-parties | Nothing funny about how The Onion got hacked
 
  Network World Security

Forward this to a Friend >>>


Adobe warns customers of unpatched critical flaw in ColdFusion
Adobe has warned users of its ColdFusion application server platform of a critical vulnerability that could give unauthorized users access to sensitive files stored on their servers. Read More


WHITE PAPER: F5

Vital Security Strategies for Microsoft Exchange
The demand for access to email anytime, anywhere, from any device makes it critical for IT to ensure Microsoft Exchange deployments are secure, fast, and available. Learn about vital security requirements every Exchange environment should have in place to improve security and availability for Exchange. Read Now.

WHITE PAPER: Raritan Inc

The Distributed Enterprise: Remote Access and IT Management
For IT managers, remote offices can cause any number of headaches. Fortunately, Raritan offers solutions to help manage remote office control, security and budgetary issues. This white paper examines and analyzes the increases in uptime and security provided by out-of-band access and control tools. Learn more.

Lesson from the Google office hack: Do not trust third-parties
The recent hack of the building management system in a Google's Australian HQ demonstrates how organizations should not trust third-party installers to adequately secure the technology. Read More

Nothing funny about how The Onion got hacked
The technical team that runs The Onion's online operation has issued a detailed explanation of how the Syrian Electronic Army managed to gain control of the satirical website's Twitter account earlier this week by first coaxing Google Apps credentials out of a few employees. Read More

Skylab: NASA's first space station marks 40 years
NASA's first space station was a pacesetter for current International Space Station and a trendsetter for scientific experiments in space Read More


WHITE PAPER: Tripwire

SANS Secure Configuration Management Demystified
Security experts and analysts agree that a systematic, enterprise-wide program of secure configuration management is one of the most beneficial security solutions you can implement. It provides an objective, concise measure of your overall security posture. Learn More

Security practices wanting in virtual machine world, survey finds
While organizations have been hot to virtualize their machine operations, that zeal hasn't been transferred to their adoption of good security practices, according to a survey released on Wednesday. Read More

IDC: Cloud, mobility exposing limitations of existing networks
The combination of highly virtualized environments inside enterprise networks, along with an explosion of mobile traffic, are exposing the limitations of existing networks, and driving the need for a new era of dynamic and scalable networks of the future, IDC researchers said in a panel discussion at Interop this week. Read More

Researchers find hundreds of insecure building control systems
Intruders used to creep in through ventilation ducts. Now they break in using the software that controls the ventilation. Read More


WHITE PAPER: F5

Scale Your DNS Infrastructure to Protect Your Business
DNS continues to be a tempting target for attackers, and when they succeed in disrupting DNS, all external data center services are affected. This paper helps organizations confronting these growth and security challenges understand how a new, full-proxy architecture for DNS provides a complete solution for global, local, and cloud load balancing. Learn More.

McAfee taps Intel to offer high-throughput intrusion-prevention system
McAfee is taking advantage of its new owners by rolling out a high-throughput intrusion-prevention system (IPS) family built on Intel technology. Read More

Hacking back: Digital revenge is sweet but risky
Let's not mince words: Cyberattacks suck. Whether criminals are hacking our passwords, or Anonymous is simply making a statement, the disruptions and data breaches exact a heavy toll in terms of time, money, and security. For example, after the Associated Press Twitter account was hacked and bogus news was posted about an attack on the White House, the U.S. stock market took a nosedive. Read More

Windows XP migration worries exaggerated by 'dead' applications
Many organisations exaggerate the difficulties of migrating from Windows XP to Windows 7 by over-estimating the importance of little-used applications, a survey from consultancy Centrix Software has suggested. Read More

NSA's secret manual on Google searching and more comes to light
Thanks to a Freedom of Information Act request from MudRock, we can now feast our eyes upon a 643-page manual from the NSA titled, "Untangling the Web: A guide to Internet Research." As the name implies, the manual is a how-to with respect to conducting detailed online research. Wired pinpoints some particularly interesting factoids from the manual: Read More

 
 
 

SLIDESHOWS

Hottest products from Interop 2013

Interop 2013, one of the biggest networking shows each year, is here and the product announcements are plentiful.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. iPad 5 rumor rollup for the week ending May 8

2. EMC lopping off another 1,004 employees

3. Commodity hardware will be hallmark of SDN networks

10. Interop network squares off against controlled 70Gbps DDoS attack

9. Intel: Keeping up with Moore's Law becoming a challenge

6. Last place you want to see a Windows error message: Las Vegas hotel elevator, 20th floor

5. Hottest products from Interop 2013

4. Time-saving PC tips and tricks

7. Passwords: You're doing it wrong. Here's how to make them uncrackable

8. Looks like Samsung's S-Voice doesn't like the iPhone

 

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

1 comment:

tarek bdworker24 said...

Search engine optimization is the best popular job because this job is a very easy and comfortable.white hat seo service is a best website for learning seo.
white hat SEO services