Search This Blog

Thursday, August 14, 2014

BlackBerry patches vulnerabilities in BlackBerry OS, enterprise server software

Users should patch critical flaw in Adobe Reader and Acrobat, researchers say | Yes, medical device security is lousy - so what?

Network World Security

Forward this to a Friend >>>


BlackBerry patches vulnerabilities in BlackBerry OS, enterprise server software
The flaws could allow attackers to access data stored on BlackBerry phones or sensitive credentials logged on servers Read More


WHITE PAPER: IBM

Quintillion Case Study
Hedge fund administration company Quintillion doubles its asset and investor portfolio while keeping staff levels almost flat, by working with Insight 2 Value to deploy an efficient content management solution, based on IBM Case Manager. Read Now

RESOURCE COMPLIMENTS OF: CSO Perspective

San Francisco CSO Perspectives Conference 9/23
Attend the CSO Perspectives Conference taking place on Tuesday, September 23 at the Hotel Nikko San Francisco. At this one-day event, produced by CSO and focused on "Data Protection & Privacy," you'll have the opportunity to get answers to your most burning security questions, and network with peers who wrestle with similar issues and concerns. Register Today!

Users should patch critical flaw in Adobe Reader and Acrobat, researchers say
Adobe also releases critical updates for Flash Player and AIR Read More

Yes, medical device security is lousy - so what?
There is no debate among security experts that the security of Internet-enabled medical devices is woefully inadequate.But there is considerable disagreement about how risky that is for patients. Some say the benefits of connected devices far outweigh what they consider minute risks of a catastrophic attack; while others say even a relatively low likelihood of an attack is too much. Life and health are, after all, much more significant than a credit card number being stolen.[Federal regulators address rising security risk to medical devices]To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: Extreme Networks

IdentiFi Brochure
IdentiFi Wireless is proven to be the most scalable Wireless solution on the market. This didn't happen overnight; IdentiFi Wireless technology has grown and evolved for over a decade with an extensive and diversified customer base. Learn more about the entire IdentiFi Wireless Solution. Learn more

Attacker could use default defibrillator password to launch denial of service
Jay Radcliffe freaked out the medical community in 2011 when he revealed how insulin pumps could be hacked to deliver a fatal dose of insulin (pdf). Yet at a medical device security and privacy roundtable discussion at Black Hat, Radcliffe said “it would be far easier and more likely for an attacker to sneak up behind him and deliver a fatal blow to his head with a baseball bat,” than hack his insulin pump to kill him.To read this article in full or to leave a comment, please click here Read More

Snowden reveals automated NSA cyberwarfare program
The U.S. National Security Agency has a cyberwarfare program that hunts for foreign cyberattacks and is able to strike back without human intervention, according to NSA leaker Edward Snowden.The NSA cyberwarfare program, called MonsterMind, uses software to look for traffic patterns indicating possible foreign cyberattacks, according to Snowden, quoted in a lengthy profile in Wired.MonsterMind could automatically block a cyberattack from entering the U.S., then retaliate against the attackers, according to the Wired story.Snowden, when he was working as an NSA contractor, was concerned that MonsterMind could lead to misdirected counterattacks. “These attacks can be spoofed,” he told Wired. “You could have someone sitting in China, for example, making it appear that one of these attacks is originating in Russia. And then we end up shooting back at a Russian hospital. What happens next?”To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: Motorola Solutions Inc.

The Next Logical Evolution in WLAN Architecture
Motorola Solutions has been the driving force behind the creation and evolution of the wireless LAN (WLAN), from its inception through today's third generation architecture. Today, they are Introducing the world's first scalable, virtualized WLAN controller that brings a new level of scalability, cost efficiency and reliability to the WLAN. Learn more

2014's Hottest IT Certification
In the world of technology, the certifications and skills that organizations need to keep pace is constantly shifting. To help you find the most valuable certifications to advance your tech career, CIO.com spoke with David Foote, Chief Analyst and Research Officer with Foote Partners, to find out what certifications are on fire in today's IT market. Read More

Malware is less concerned about virtual machines
Symantec finds most malware doesn't quit if it runs on VM, which used to be a sign it was being analyzed Read More


SLIDESHOWS

Black Hat 2014: How to crack just about everything

From cell phones and cars to IPv6 security researchers have turned their skills against a world of technology.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Netscout sues Gartner over Magic Quadrant rating

2. Why TCP/IP is on the way out

3. Amazon Fire Phone: Nice but nothing to get fired up about

4. Rackspace bows out commodity IaaS market in favor of 'managed cloud'

5. Cisco's new UCS fabric interconnect: no ACI?

6. Smartphone kill-switch bill passes California assembly

7. Emerging networking technology used by Apple, Cisco will frustrate firewalls

8. IBM/DARPA turn out brain-like 5-billion transistor superchip

9. 10 ways to get noticed at Black Hat

10. Top 20 colleges for computer science majors, based on earning potential


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: