Search This Blog

Friday, October 11, 2013

Cisco patches vulnerabilities in some security appliances, switches and routers

Smart machines: "Futurist fantasy" or future job menace? | Hackers exploit vBulletin vulnerability to inject rogue administrator accounts

Network World Security

Forward this to a Friend >>>


Cisco patches vulnerabilities in some security appliances, switches and routers
Cisco Systems has released security patches for authentication bypass, command execution and denial-of-service vulnerabilities affecting products that use its Adaptive Security Appliance (ASA) software, as well as the Cisco Catalyst 6500 series switches and Cisco 7600 series routers. Read More


WHITE PAPER: HP and Intel® Xeon® processors

HP StoreOnce with Symantec Backup Solutions
This paper looks specifically at the considerations and benefits achievable when an organization deploys data protection architectures powered by HP StoreOnce appliances and Catalyst APIs with Symantec OpenStorage Technology (OST). Learn More

WHITE PAPER: AT&T

How to navigate the ever-changing mobile device landscape
Smartphones, tablets, social networks, and cloud services are all popular, incredibly useful, and a security risk. These days, the security focus is on mobile devices, as they tend to be used a lot to work with corporate information. Learn More

Smart machines: "Futurist fantasy" or future job menace?
One of the hot topics at this week's Gartner Symposium/ITExpo is the future impact of smart machines that exploit machine learning and deep-learning algorithms to let them behave autonomously and can adapt to their environment. Read More

Hackers exploit vBulletin vulnerability to inject rogue administrator accounts
Hackers are exploiting a vulnerability in the popular vBulletin Internet forum software in order to inject rogue administrator accounts into websites using it. Read More

Researcher argues for open hardware to defend against NSA spying
While there is no foolproof defense against government spying, snooping by entities like the National Security Agency could be made far more difficult through the use of Internet infrastructure built on open-source hardware, an academic researcher says. Read More


WHITE PAPER: New Relic

Secure, Reliable & Proven APM for the Enterprise
Your organization depends on your web applications to do business -- from customer facing eCommerce,banking or travel applications, to mission-critical applications for your employees or partners. When it comes to performance, visitors' expectations for service and reliability are high. Read Now

'Barbie Dreamhouse' bug changes Mac, iPhone calendar's gaudy colors
A bug on Apple's iCloud servers -- the second in the last three months -- turned OS X and iOS user calendars into a dizzying palette of what one customer called 'Barbie Dreamhouse' colors. Read More

20 free PC apps to ease daily tasks
Read More

Microsoft security guru: Abusing data should be a felony
If Microsoft's chief security adviser had his way, it would be a felony to misuse personal data. Read More


WHITE PAPER: Cisco Wi-Fi Challenge NWW Jun-Aug13

Cisco Connected Mobile Experiences
Whether you are in retail, hospitality, healthcare, transportation, or another industry, keeping and attracting customers is crucial to the success of your organization. Cisco Connected Mobile Experiences can help you improve customer loyalty and increase revenue. Learn more.

So much data, so little security -- what happens if your city gets hacked?
Businesses and individuals had better brace themselves for new security realities as society moves away from the traditional data sharing equation that has worked well for a couple of decades. Read More

D'oh! Basic flaw in WhatsApp could allow attackers to decrypt messages
The popular mobile messaging application WhatsApp Messenger has a major design flaw in its cryptographic implementation that could allow attackers to decrypt intercepted messages, according to a Dutch developer. Read More

Google's Graveyard: 13 products Google killed off in 2013
Google giveth (including Google Death) and Google taketh away. This year, the company has sent a host of well-known and more obscure offerings to their demise. But don't worry, the company still has dozens of new and old products in its portfolio. Here's a look back at the ones killed off this year. Read More

Security automation research – with a human touch – could net nearly $50M grant
Researchers from Carnegie Mellon University and Army Research Laboratory will join forces with those from a handful of universities in an effort to better automate cybersecurity decisions. The five-year project has attracted $23.2 million in funding from CMU's CyLab, and could be extended to $48.2 million over 10 years. Read More


SLIDESHOWS

The 'Bad Boys' of open source

The open source world's most notorious characters.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. In a room with no cell service, Verizon works on the future of mobile

2. Careers that are being automated into oblivion

3. Why I'm excited for Linux Mint 16, even though I don't like Mint

4. Gartner: The top 10 IT altering predictions for 2014

5. 10 ways IT pros can reduce stress at work

6. NSA backdoor fears creating crisis of confidence in U.S. high-tech products, services

7. Your car is about to go open source

8. Three lessons from Netflix on how to live in the cloud

9. Shh ... Cisco's latest switch supports VMware NSX

10. Inside CIO paychecks


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: