Search This Blog

Friday, March 06, 2015

iPhone theft victims tricked into unlocking devices

  Should I be scared of the guy sitting next to me at this security conference? | Secure browsers offer alternatives to Chrome, IE and Firefox

 
  Network World Compliance  

iPhone theft victims tricked into unlocking devices
  Victims are lured through text messages to a fake iCloud login page Read More
 


WHITE PAPER: Quantum Secure
 
The Road to Predictive Analytics Paved with Good Intentions
Learn why the time to start thinking about the most effective ways to deploy predictive analytics for security and to address key areas—security policies, physical security and audits—is now. Learn more >>

In this Issue


WHITE PAPER: Quantum Secure
 
When It Comes to Security, Can You Identify Insider Threats?
To address the evolving insider threat landscape, enterprises need to think about their own potential for insider threats. Download this exclusive Tech Dossier to learn what insider threats look like, how to protect against them, and why Quantum Secure can help. Learn more >>

Should I be scared of the guy sitting next to me at this security conference?
Here I am, minding my own business at SecureWorld Boston session led by a Cisco representative, when along comes an axe-wielding guy twirling his weapon beside me.Turns out VeriSign was handing them out on the exhibit floor to help people fight off DDoSes. To read this article in full or to leave a comment, please click here Read More
 

 

INSIDER
Secure browsers offer alternatives to Chrome, IE and Firefox
The Web browser has been a major infection vector for years, allowing malware to be transported to millions of computers through phishing, man-in-the-middle, SQL injection and countless other attacks. But what if there were a way to stop this madness and secure the browsing channel itself? Read More
 

 

FREAK attack: How to keep your code secure
  Bill Weinberg, Senior Director, Open Source Strategy, Black Duck SoftwareRemember the 1990s, when the Netscape browser was all the rage and Secure Socket Layer (SSL) encryption was a brand-new idea? Back then, the U.S. government wanted to control the export of "weapons grade" encryption. Its theory was that domestic communications could benefit from stronger, 128-bit encryption, but "backdoors" should be available to U.S. intelligence and law enforcement when it came to foreign communications. Thus, the concept of weaker, "export grade" encryption was born.Fast forward to 2015 and it turns out that this legacy backdoor, a vulnerability that we've come to know as "The FREAK Attack," still exists in anywhere from a quarter to a third of all deployed web servers. It's a sad example of how zombie security holes from the era of grunge fashion can return to bite us. The question is: what to do now and how can you ensure your code is safe?To read this article in full or to leave a comment, please click here Read More
 

Best new Android & Windows smartphones at MWC 2015
Best at MWC 2015Samsung, HTC, Sony, Microsoft and others are using the annual Mobile World Congress (MWC) event in Barcelona to debut their latest smartphones and other gear. Here's a look at the new Android and Windows devices.ALSO: Read all the stories out of MWC 2015To read this article in full or to leave a comment, please click here Read More
 


WHITE PAPER: VMTurbo, Inc.
 
Cloud: Delivering Performance in Shared Environments
This whitepaper explores how service providers use VMTurbo to provide consistent performance across all workloads, as well as the three roles a responsible managed service provider (MSP) takes in order to accomplish that directive. Learn More

NSA authorization to collect bulk phone data extended to June 1
The approval will be the last before the relevant statute in the Patriot Act comes up for renewal Read More
 

White House privacy proposal aims to give consumers control over data
Some privacy advocates, however, say the draft bill limits privacy enforcement actions by the Federal Trade Commission Read More
 

 

INSIDER
Virtual machine (VM) security still a work in progress
Trying to protect your expanding virtual machine (VM) empire will require a security product that can enforce policies, prevent VMs from being terminated or infected, and deliver the virtual equivalents of firewalls, IPS and anti-virus solutions. Read More

 

FREAK is another serious flaw in the web's encryption
  US export restrictions on encryption technology from the 1990s have come back to haunt the modern Web Read More
 


WHITE PAPER: IBM

Forrester Total Economic Impact of PureApplication Systems
IBM PureApplication System converges compute, storage, networking components, and software into a preconfigured and pretested system. This Forrester paper helps to better understand the benefits, costs, and risks associated with the IBM PureApplication System. Learn More

D-Link patches router, says more fixes are on the way
  The vulnerabilities affect eight router models Read More
 

Drive-by attack relies on hacked GoDaddy accounts
The Angler exploit kit is using subdomains created by cybercriminals on real domain name accounts as part of its infrastructure Read More
 

China says new cybersurveillance proposal follows US security practices
The U.S. argues China's anti-terrorism law would require foreign tech businesses to hand over sensitive data to the government Read More
 

Finnish companies join forces to build secure OS for smartphones and tablets
A new version of Jolla's Sailfish OS is getting locked down with the help of SSH Read More
 

 

INSIDER
Encrypting sensitive data is a must; new key management tools make it easy
Encryption is one of the best ways to prevent the type of terrible headaches that many high-profile companies have experienced with stolen data. Even if experienced hackers are able to penetrate a system, having the data encrypted can mean that nothing useful is taken. Read More

 

MIT researchers building chips to prevent leaky Internet of Things
MIT researchers this week are demonstrating a design for new radio chips that could be used to efficiently power the Internet of Things.The researchers, led by MIT Professor in Electrical Engineering Anantha Chandrakasan, are presenting their work at the IEEE International Solid-State Circuits Conference in San Francisco, where the show theme is "Silicon Systems -- Small Chips for Big Data." The MIT paper is titled "A +10dBm 2.4GHz Transmitter with sub-400pW Leakage and 43.7% System Efficiency."MORE: Internet of Things to bring new economic boomTo read this article in full or to leave a comment, please click here Read More
 

 

SLIDESHOWS

15 of the best Google Chrome experiments ever

A look at some of the coolest bits of Chrome experimentation out there, in honor of Google's 1000th Chrome experiment being published this week.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. FTC targets group that made billions of robocalls

2. Aruba Networks is different than HP's failed wireless acquisitions

3. What happens inside Amazon when there's a Xen vulnerability

4. Backyard ice bar gets cooler with 3D printing

5. 10 cool tablets from MWC 2015

6. Cisco unfazed by HP/Aruba

7. Cisco might ONIE up

8. FREAK attack: How to keep your code secure

9. 8 free Wi-Fi stumbling and surveying tools

10. Best new Android & Windows smartphones at MWC 2015


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments: