Search This Blog

Thursday, January 23, 2014

Boycotting RSA Conference is a misplaced endeavor

TrustyCon vs. RSA and NSA: New conference pushes trustworthy agenda | Researchers discover Spoiled Onions: Evil Tor exit relays spying on Facebook users

Network World Security

Forward this to a Friend >>>


Boycotting RSA Conference is a misplaced endeavor
I have watched on silently from the sidelines as the "boycott RSA Conference" story has played out. Now that we are a month or so away from the conference "where the world talks security" I just can't hold it in any longer. I really think the few outliers who have announced they are boycotting and not speaking or attending this year's RSA Conference have gotten more than their 15 minutes worth. ... Read More


WHITE PAPER: HootSuite Media, Inc.

5 Step Guide to Social Media Security
As businesses embrace social media, related security breaches are on the rise. Corporate Twitter hackings. Rogue employees on the company Facebook account. Executives sharing confidential info on their personal accounts. Learn More

WHITE PAPER: F5 Networks

Post-TMG: Securing Internet Facing Microsoft Apps
Organizations currently using or considering Microsoft Forefront Threat Management Gateway (TMG) may face the dilemma of how, and what, administrators will use to secure Internet-facing Microsoft applications such as Exchange, SharePoint, and Lync with the departure of TMG. Read this paper to learn more about alternative solutions to Microsoft TMG. Read now>>

TrustyCon vs. RSA and NSA: New conference pushes trustworthy agenda
Who do you trust? That's a question asked increasingly by a security industry with a growing sense that the National Security Agency (NSA) has sought to weaken encryption or get backdoors into computers, based on documents leaked by Edward Snowden to the media. Now, trust is also the theme of a new conference called TrustyCon that will vie for attention on Feb. 27 in San Francisco while the big RSA Conference for security pros is also taking place in that city. Read More

Researchers discover Spoiled Onions: Evil Tor exit relays spying on Facebook users
Tor, The Onion Router that helps protect users' privacy, just can't catch a break lately. First Microsoft remotely deleted Tor from Windows machines during an attempt to takedown the Sefnit botnet. Then the research paper, Spoiled Onions: Exposing Malicious Tor Exit Relays [pdf], explained how evil nodes in Russia were being used to spy on Facebook users as well as Tor users browsing other sites. Microsoft... Read More


WHITE PAPER: Apperian

Unlock the Value of Enterprise Mobility
Download this guide and learn how to manage the secure deployment of enterprise mobile apps and data, while still encouraging the levels of employee adoption needed to drive the productivity and ROI gains that are possible. Learn More

10 trends in IT spending for 2014
After years of maintenance-only spending, IT leaders are ready to invest. Find out which technologies -- and which IT professionals -- are pulling down the dough. Read More

China blames Internet outage on hacking attack
Tuesday's Internet outage in China is dividing experts over what caused the networking error, with authorities calling it a hacking attack, and others blaming it on the country's censorship systems. Read More


WHITE PAPER: HP and Intel®

Storage Insight: Debunk the Data Storage Myths
Of all the obstacles standing in the way of building a better IT infrastructure, misinformation may be the most daunting. This informative eBook is designed to provide the immediate insight you need to make the right decisions about some of the most important IT issues your enterprise will ever face. Read Now>>

Some Tor exit nodes attempt to spy on encrypted traffic, researchers find
Computer scientists found almost 20 exit relays in the Tor anonymity network that attempted to spy on users' encrypted traffic using man-in-the-middle techniques. Read More

12 privacy-destroying technologies that should scare you
Technology is not evil, only its use or misuse. But in the case of this dirty dozen, the potential for abuse is frightening. Read More

The processes and tools behind a true APT campaign: Weaponization and delivery
This article is part of a series about APT campaigns. The other topics covered in this series are reconnaissance, weaponization and delivery, command and control, and exfiltration. Read More


SLIDESHOWS

30 years of Apple's Mac computer

A visual history of the Mac..

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Better than TV! White spaces bring wireless bonanza to West Virginia

2. ATMs could be compromised when Windows XP support ends

3. 30 years of Apple's Mac computer

4. Top 25 most commonly used and worst passwords of 2013

5. 12 privacy-destroying technologies that should scare you

6. Target hackers may have stolen useless data

7. Brocade exits network adapter business

8. How Apple and Pepsi fumbled their 2004 Super Bowl ad play

9. Survey sheds light on mobile-manic young workers

10. Three-year, 27,000 drive study reveals the most reliable hard drive makers


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: