Search This Blog

Wednesday, July 16, 2014

Microsoft rumored to be buying security firm that publicized Active Directory exploit

Network World Security - Newsletter - networkworld.com
Google sets up cybercrime-busting task force | Russian hackers breach CNET, steal one million usernames, passwords & email addresses

Network World Security

Forward this to a Friend >>>


Microsoft rumored to be buying security firm that publicized Active Directory exploit
Microsoft is thinking about buying an Israeli security company that yesterday posted instructions on how to change Active Directory passwords by exploiting a design flaw.Microsoft is talking to startup Aorato, according to a source quoted by The Wall Street Journal, with the possibility that a deal could be struck by the end of the summer. The buying price mentioned is $200 million.To read this article in full or to leave a comment, please click here Read More


RESOURCE COMPLIMENTS OF: Guidance Software

The Impact of EnCase Cybersecurity for Incident Response.
A global automobile manufacturer opened its doors to Forrester Consulting to conduct a detailed study of the benefits realized from the use of EnCase Cybersecurity. The study revealed users can expect: 89% reduction in the time it takes to identify threats and develop remediation plan; 388% return over three years; and a four month payback period. Download the full Forrester report to see the total economic impact that organizations can achieve by implementing EnCase Cybersecurity.

WHITE PAPER: HP

Protecting Your Mid-Size Business from Security Threats
Security breaches in large enterprises make the headlines, but 55% of small and mid-size businesses have also experienced a data breach. And 60% of small businesses fail within six months of falling victim to a cyber attack. Learn More

Google sets up cybercrime-busting task force
After unearthing the Heartbleed flaw, Google sets up a research group dedicated to finding vulnerabilities in Web software Read More

Russian hackers breach CNET, steal one million usernames, passwords & email addresses
The Russian hacker group that goes by w0rm breached CNET and pilfered a database containing usernames, emails, and encrypted passwords for more than a million registered users. Read More


WHITE PAPER: HootSuite Media, Inc.

Mapping Organizational Roles for Social Media Risk
Social media has introduced a wide array of opportunities for organizations to engage with customers, employees and partners. But with these opportunities come risks. What is less clear is who is responsible for managing and mitigating the risks tied to social media. Learn More

The CISO-centric Information Security Triad
CISO responsibilities are expanding and must be supported with the right skill sets, technologies, and industry recognition. Read More

Threat intelligence lifecycle maturation in the enterprise market
A plethora of intelligence feeds are driving new products, services, and enterprise threat intelligence strategy. Read More


WHITE PAPER: PrinterLogic

Printer Installer: Eliminating Print Servers
Printer Installer is an on-premise web application that enables you to centrally manage and deploy Windows shared or direct iP printers. Learn More

U.S. malware share rising, Amazon service No.1 in hosting it
In its quarterly report on global malware distribution and threats, security firm Solutionary Tuesday said that 56% of the malware it captured via sensors and other means was hosted in the U.S.— a 12% increase from six months ago — and about half of the malware overall appeared to originate at 10 Internet service and hosting providers.This “Top 10” list includes Amazon Web Services, France’s OVH, Akamai, Google, Akrino, Hetzner Online, CloudFlare, CDN, GoDaddy and Website Welcome, according to Solutionary.In a comparison to what it found in the fourth quarter of 2013 through the same methodology, Solutionary reports that GoDaddy’s percentage of actively hosted malware dropped from 14% to 2%. But “on the other end of the spectrum, sites supported through Amazon services showed a massive increase moving from 16% to 41% of the identified malware hosts, retaining their top spot in the top 10.”To read this article in full or to leave a comment, please click here Read More

Overreliance on the NSA led to weak crypto standard, NIST advisers find
The National Institute of Standards and Technology needs to hire more cryptographers and improve its collaboration with the industry and academia, reducing its reliance on the U.S. National Security Agency for decisions around cryptographic standards.Lack of internal expertise in certain areas of cryptography and too much trust in the NSA led NIST to ignore security concerns about a pseudorandom number generator called Dual_EC_DRBG (Dual Elliptic Curve Deterministic Random Bit Generator) in 2006, technical experts who reviewed the organization’s standards development process said in a report released Monday.To read this article in full or to leave a comment, please click here Read More

DARPA initiates reusable, aircraft-like spaceship development
Looking to build a hypersonic transport would be the heart of less expensive satellite launch system, the Defense Advanced Research Projects Agency (DARPA) said it awarded three contracts to being work on the spacecraft.DARPA said Boeing (working with Blue Origin) Masten Space Systems (working with XCOR Aerospace) and Northrop Grumman Corporation (working with Virgin Galactic) would begin phase 1 work on the agency’s Experimental Spaceplane (XS-1) program that aims to design, build, and demonstrate a reusable Mach 10 aircraft capable of carrying and deploying an upper stage that can place 3,000- 5,000 lb. satellite into low earth orbit (LEO) at a target cost of less than $5M per launch.To read this article in full or to leave a comment, please click here Read More

Feds declare big win over Cryptolocker ransomware
'Neutralized' the extortion software; but hacker gang is already spewing new malware, experts say Read More


SLIDESHOWS

Worst data breaches of 2014…So far

We identified the worst of these for the first quarter of the year, and now we show you the worst for April though June.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Windows Phone 8.1 and its first update could appear this week

2. Ubuntu 14.04: Is Canonical taking on too much?

3. 10 changes CEO Nadella wants from Microsoft workers

4. Say goodbye to desktop phones

5. The Firewall: Questions abound about its future role in cloud, mobile and SDN environments

6. The worst security SNAFUs this year (so far!)

7. 20 cool things you can do with a Raspberry Pi

8. Cisco singing a different ACI tune

9. New products of the week 07.14.14

10. MIT invents T-1000 robot precursor technology, may have doomed us all


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: