Friday, June 05, 2015

New SOHO router security audit uncovers over 60 flaws in 22 models

Internet of Things breathes new life into RFID technology | Researcher warns popular gaming plug-in puts millions of web users at risk from data thieves

Network World Compliance

New SOHO router security audit uncovers over 60 flaws in 22 models
Some of the vulnerabilities could allow attackers to take over the affected devices Read More


: Open Text

How Businesses Connect, Communicate, and Collaborate
Whether you're new to EDI, need to get EDI-compliant or simply want to educate your business colleagues, EDI Basics provides an easy-to-understand explanation of the fundamental concepts. View Now.

In this Issue


WHITE PAPER: LogMeIn

Collaboration 2.0 Death of the Web Conference
This new study from Ovum and join.me by LogMeIn is based on a survey of over 3,900 full time professionals worldwide regarding their collaboration and meeting-related behaviors and activities. Learn More

INSIDER
Internet of Things breathes new life into RFID technology
About a decade or so ago, it was almost impossible to find a tech analyst who wasn't predicting that radio-frequency identification (RFID) would soon change the world. While RFID eventually became a useful tool in retail, logistics, healthcare and a handful of other enterprise sectors, the technology largely lurked in the shadows while other truly transformative concepts, such as social media and streaming entertainment, grabbed the spotlight.To read this article in full or to leave a comment, please click here(Insider Story) Read More

Researcher warns popular gaming plug-in puts millions of web users at risk from data thieves
In a demo posted on YouTube, the researcher shows how a flaw in the Unity Web Player could let an attacker access a Gmail account Read More

Annual WITI Summit taps into awareness, frustration over lack of women in IT
WITI Increased awareness of the lack of women in the IT workforce and in technology leadership positions has not been lost on the organizer of next week’s Women in Technology Summit in San Jose. Women in Technology International (WITI) is looking to leverage rising interest in this issue to attract more people to attend its annual event, either in person or online.WITI was founded in 1989 by Carolyn Leighton in recognition that women back then weren’t being paid or treated fairly in the technology industry. And while some would say things have come a long way, the percentage of women in the US IT workforce has actually been on the decline since around then.To read this article in full or to leave a comment, please click here Read More

Datameer adds governance tools for Hadoop analytics
Data-profiling tools help companies find and fix issues such as inconsistent or invalid data Read More


WHITE PAPER: NopSec, Inc.

Market Overview: Vulnerability Management
This new analyst report explores the key challenges to effective vulnerability risk management, how technology integration is improving the vulnerability management process, and the emerging solutions available to help organizations move beyond scanning. Learn More.

Senate passes bill to rein in NSA phone dragnet
Senators reject amendments to 'water down' the NSA reform bill Read More

Tor connections to hidden services could be easy to de-anonymize
It's safer to access Internet websites over Tor than hidden services, researchers said Read More

Users with weak SSH keys had access to GitHub repositories for popular projects
GitHub revoked the keys, but it's not clear if they were ever abused by attackers Read More

Fraud campaign installs rogue app on non-jailbroken iPhones
The attackers are likely abusing Apple's iOS Developer Enterprise Program, researchers said Read More


WEBCAST: New Relic| Emulex| AppNeta| CA

Performance Management in the Cloud
Susan Tran from CA Technologies, Shaun Walsh of Emulex and industry analyst Robin Layland explore the new challenges created for performance management solutions when applications migrate to the cloud. View now

Apple vulnerability could allow firmware modifications, researcher says
Older Apple systems unlock the firmware after a computer goes to sleep Read More

Google levels up security at I/O with secure comms tool, better authentication
Project Vault secure MicroSD card, Project Abacus password replacement and other tech to improve users' security Read More

Really smart phones: Now they can predict your GPA
Researchers at Dartmouth College and the University of Texas at Austin have developed an Android app that they say can predict students’ grade point averages without prior knowledge of data such as SAT scores, IQ or school track records. What’s more, the technology could have future applications for predicting employee performance.SmartGPA is a cloud-backed app that relies on embedded passive sensors as well as special algorithms that can determine behaviors by the phone user, from studying to partying to face-to-face-communications to sleep. That information can then be crunched to predict students’ GPA within 17 hundreds of a point, according to Andrew T. Campbell, who co-authored paper on the research with colleagues from Dartmouth and the University of Texas at Austin.To read this article in full or to leave a comment, please click here Read More

INSIDER
VMware 6.0: Faster, smarter, more resilient
VMware 6 pays more attention to high availability and large deployment than prior editions—with a kick to the throttle in terms of overall speed of scale, not just size of scale. This comes with a mixture of incremental upgrades, and a bit of administrative thoughtfulness.To read this article in full or to leave a comment, please click here(Insider Story) Read More


SLIDESHOWS

Windows 10: Which classic Microsoft default apps should be killed?

Based on what we've seen in Microsoft's Windows 10 preview editions, here's our take on which classic apps should be kept and which should be killed when the final version of Windows 10 ships.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Cisco announces new CEO's executive team, more departures

2. Google kicks Google+ off its homepage

3. What apps sell or steal your data or take over your phone? PrivacyHawk can tell you

4. NASA drops $2.3M on supersonic aircraft research

5. VMware's vSphere 6.0: Faster, smarter, more resilient

6. HP, Arista team to take on Cisco, IBM, EMC in converged infrastructure

7. How Cisco's Piston acquisition will improve Intercloud

8. Reserve your free Windows 10 upgrade, download available on July 29

9. 9 useful PowerShell tools

10. What if the iPhone debuted in 1984?


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment