Search This Blog

Friday, October 17, 2014

Security experts warn of 'POODLE' attack against SSL 3.0

Top Mac-o-lanterns from around the Web | How-to: Get started with MariaDB

Network World Compliance

Security experts warn of 'POODLE' attack against SSL 3.0
Google researchers have found a severe flaw in an obsolete but still used encryption software, which could be exploited to steal sensitive data. The flaw in SSL 3.0 is more than 15 years old but is still used by modern web browsers and servers. SSL stands for "Secure Sockets Layer," which encrypts data between a client and server and secures most data sent over the Internet. Bodo Möller, Thai Duong and Krzysztof Kotowicz of Google developed an attack called "POODLE," which stands for Padding Oracle On Downgraded Legacy Encryption, according to their research paper. Web browsers are designed to use newer versions of SSL or TLS (Transport Layer Security), but most browsers will accommodate SSL 3.0 if that's all that a server can do on the other end.To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: Masergy Communications Inc.

An Integrated Approach to Managed Network Security
For a growing number of organizations plagued by continuing security issues, the answer to the high cost, complexity and uncertainty surrounding network security is a managed security service built on a unified, behavioral-based security architecture that is integrated, modular, and centrally managed. Learn More

WHITE PAPER: Kaminario

Testing of VMware View VDI on Kaminario K2 storage
This technical report covers detailed performance and efficiency tests for the Kaminario K2 array supporting VMware Horizon View virtual desktops that quantify its ability to support a range of critical VDI workloads. Learn More>>

Top Mac-o-lanterns from around the Web
Apple devotionA snapshot of Apple devotion expressed via carved vegetation.Not a fanboy, really?Poqua on Flickr says: I'm not an Apple fanboy, although I do have a Mac mini. I just like logos.To read this article in full or to leave a comment, please click here Read More

INSIDER
How-to: Get started with MariaDB
MariaDB is a fork of the wildly popular open source database MySQL. Although MariaDB is very similar to MySQL, it is not necessarily the same. One of the primary goals behind the MariaDB project is to serve as a drop-in replacement for MySQL, but MariaDB also offers features beyond those available in MySQL.To read this article in full or to leave a comment, please click here(Insider Story) Read More

Microsoft researchers create a secure haven in the cloud
To ensure trusted cloud operations, Microsoft Haven uses a new type of virtual machine and a set of new Intel chip security calls Read More


WEBCAST: Alcatel-Lucent Enterprise

Integrating Mobility with Unified Access
Meeting mobility demands of 4500 students, faculty and staff at a university is no small task. Join this Webcast to hear the Director of Enterprise Infrastructure explain the steps Abilene Christian University took to deliver a new level of student-faculty interaction. Learn More

7 all-in-one security suites: Anti-malware for all your devices
Let's face it: No matter what device you use, you're in danger. Security threats and malware lurk on Windows PCs, Macs, and Android and iOS devices. If you use more than one device -- like most of us do -- that makes it even more difficult and expensive to be vigilant and keep yourself safe. Read More

12 things I hate about Hadoop
I love the elephant. The elephant loves me. Nothing is perfect, however, and sometimes friends fight.Here are the things I fight with Hadoop about.[ Also on InfoWorld: Harness the power of Hadoop -- find out how in InfoWorld's Deep Dive report. | 18 essential Hadoop tools for crunching big data. | Get the latest insight on the tech news that matters from InfoWorld's Tech Watch blog. ] 1. Pig vs. Hive You cannot use Hive UDFs in Pig. You have to use HCatalog to access Hive tables in Pig. You cannot use Pig UDFs in Hive. Whether it's one little extra functionality I need while in Hive, but don’t really feel like writing a full-on Pig script or it's the “gee, I could easily do this if I were just in Hive” while I’m writing Pig scripts, I frequently think, “Tear down this wall!” when I’m writing in either.To read this article in full or to leave a comment, please click here Read More

FBI warns of cyberattacks linked to China
The U.S. Federal Bureau of Investigation issued a warning to companies and organizations on Wednesday of cyberattacks by people linked with the Chinese government.The advisory, issued privately, contains “information they can use to help determine whether their systems have been compromised by these actors and provides steps they can take to mitigate any continuing threats,” according to an FBI statement.The warning comes a day after security companies said they’ve been working closely together to enable their products to detect several hacking tools used by a China-based group against U.S. and other companies over several years.To read this article in full or to leave a comment, please click here Read More


: Curvature

Case Study: From Edge to Core, Across Multiple Locations
The Sisters of Charity Health System faced the challenge of offering the best technology support while keeping operational expenditures in line with budgetary constraints. They sought Curvature to develop a best-of-breed networking solution, leading to cost benefits as well as increased efficiency. Learn more

The world's craziest contraband
As the Transportation Security Administration documents every week, people will bring the weirdest stuff on airplanes. But the nutty stuff isn't confined to airplanes or to travelers in the U.S. Here we take a look at a collection of crazy stuff people have tried to get into other countries – as well as the U.S. in some cases – via airplane or other means. Read More

Anonabox backpedals on 'custom' hardware claims as Reddit points at Chinese versions
I’m not a fan of fundraising campaigns that promise privacy, but when the money goal is not reached, then the campaign keeps all the funds with no product delivered. Yet not everyone trying to raise money for a project will succeed, not all failed projects keep the funds, and you can’t please everyone all the time. The insanely popular Anonabox router has raised a crazy amount of money, but some Redditers are not pleased about Anonabox claims that the hardware was custom-designed and open source.To read this article in full or to leave a comment, please click here Read More

YouTube served malicious advertisements, Trend Micro says
Malicious advertisements, some of which were displayed on YouTube, redirected more than 113,000 people in the U.S. to harmful websites in just a month, Trend Micro said Tuesday.Although online advertising companies try to detect and block such ads from being circulated on their networks, bad ones sometimes get through. Such ads can be very productive for hackers. It can mean a large pool of victims if shown on a high-traffic website.“This was a worrying development: Not only were malicious ads showing up on YouTube, they were on videos with more than 11 million views—in particular, a music video uploaded by a high-profile record label,” wrote Joseph Chen, a fraud researcher, on Trend Micro’s blog.To read this article in full or to leave a comment, please click here Read More

McAfee's most dangerous cyber celebrities of 2014
McAfee has revealed its 2014 list of the Most Dangerous Cyber Celebrities – those whose names are most likely to lead you into online trouble if you search on them. You’re safe cruising through this slideshow though…To read this article in full or to leave a comment, please click here Read More


SLIDESHOWS

The Onion's 9 best bits about Microsoft

Poking fun at the software giant and founder Bill Gates since 1996.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Moto X 2nd Gen review: Same same but different

2. Conspiracy Theory With Teeth: Government Allegedly Forced TruTV To Yank FEMA Camps Episode

3. Anonabox backpedals on 'custom' hardware claims as Reddit points at Chinese versions

4. First Look: The magnificent new Nexus 6 and Nexus 9

5. The Snappening: Snapsaved admits to hack that leaked SnapChat photos

6. The world's craziest contraband

7. Microsoft patches 3 zero-days including Sandworm on Patch Tuesday

8. Gartner: Top 10 Technology Trends for 2015 IT can't ignore

9. Last minute iPad Air, iPad Mini, and iMac rumors ahead of Apple's special event

10. 7 free tools every network needs


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: