Search This Blog

Thursday, July 31, 2014

Antivirus products riddled with security flaws, researcher says

Internet of things devices contain high number of vulnerabilities, study finds | Cybersecurity Startup Gold Rush for Venture Capitalists

Network World Security

Forward this to a Friend >>>


Antivirus products riddled with security flaws, researcher says
Antivirus products increase a computer's attack surface and may even lower operating system protections, a security researcher claims Read More


WEBCAST: Cisco Systems

Innovations that Protect Against Advanced Attackers
This webinar will explore new technologies and process for protecting endpoints from advanced attackers and how innovations like continuous data collection combined with big data analytics are pushing the envelope for what security teams can do during and after an advanced attacker puts them in their sights. Learn more >>

RESOURCE COMPLIMENTS OF: CSO Perspective

Save the Date: Boston-Area CSO Perspectives Conference 9/16
The Boston-area CSO Perspectives Conference is being held on Tuesday, September 16 at the Sheraton Framingham Hotel. At this one-day event, produced by CSO and focused on "Defending Against the Pervasive Attacker," you'll have the opportunity to connect with an extensive network of visionary CSOs, CIOs and business experts. Register now.

Internet of things devices contain high number of vulnerabilities, study finds
A security audit of 10 popular Internet-connected devices—components of the so-called “Internet of things”—identified an alarmingly high number of vulnerabilities.The study lasted three weeks and was performed by researchers from Hewlett-Packard’s Fortify division. It targeted devices from some of the most common IoT categories: TVs, webcams, home thermostats, remote power outlets, sprinkler controllers, hubs for controlling multiple devices, door locks, home alarms, scales and garage door openers.All of the analyzed devices, which weren’t named in the resulting report published Tuesday, communicated with some type of cloud service, as well as mobile applications that allowed users to remotely control them.To read this article in full or to leave a comment, please click here Read More

Cybersecurity Startup Gold Rush for Venture Capitalists
According to a PrivCo, a financial data provider on privately-held companies, venture capital firms are poised to push $788 million into early stage cybersecurity startups this year. This investment amounts to a 74% increase from last year’s $452 million (note: see this article for more details).If you follow cybersecurity trends, it’s easy to understand why VC fat cats are throwing money around. For one thing, the threat landscape continues to become increasingly dangerous. In fact, ESG research indicates that 57% of security professionals working at enterprise organizations (i.e. more than 1,000 employees) believe that the threat landscape is “significantly worse” or “somewhat worse” than it was two years ago (note: I am an ESG employee). So large organizations clearly need help and there are rich rewards waiting for cybersecurity vendors that can come to their aid – after announcing better than expected financial results, Check Point and Fortinet shares are trading at or near a 52-week high.To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: Fortinet

NSS Data Center Firewall Test
NSS Labs Product Analysis for Fortinet Data Center Firewall Learn More

iPhone gets first free app for encrypting voice calls
Signal is compatible with RedPhone, its Android sibling Read More

Time to rethink the CAN SPAM Act
The CAN SPAM Act is now 11 years old and as good as it has been, the Act needs to be updated to address the realities of modern marketing. Read More


WHITE PAPER: Citrix Systems

Defend Web Properties with Citrix NetScaler
Today, defending your organization's web properties means more than just protecting a handful of enterprise web applications from advanced malware. Learn more on the complexity and challenges of defending against today's modern threats and discover how Citrix NetScaler application delivery controller (ADC) is an ideal defense solution. Learn more

Using Instagram on public Wi-Fi poses risk of an account hijack, researcher says
Instagram is moving to full https encryption but isn't there just yet Read More

New guide aims to remove the drama of reporting software flaws
Bugcrowd worked with a legal firm, CipherLaw, to develop the framework Read More


SLIDESHOWS

Black Hat 2014: How to crack just about everything

From cell phones and cars to IPv6 security researchers have turned their skills against a world of technology.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. About those alleged backdoors in Microsoft products...

2. Apple iWatch launch may be pushed back until December

3. A breakdown of Cisco ACI pricing

4. Black Hat 2014: How to crack just about everything

5. Abuse of Larry Ellison continues unabated

6. Zero-day flaws found in Symantec's Endpoint Protection

7. 20 cool things you can do with a Raspberry Pi

8. Windows 9 in November? Don't believe it

9. Guns, vandals and thieves: Data shows US networks under attack

10. 10 disturbing attacks at Black Hat USA 2014


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: