Wednesday, February 11, 2009

Security Geeks: From Isolation to Rock Stars; FAA network hacked; Your Identity: 'Costanza Style'

How to steal $9M from ATMs in 30 minutes; Microsoft patches flaw that could cripple Exchange
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Trend Micro
rule

Four Layers of Security Protection.
Web threats are coming at you from every angle. This whitepaper reveals how to protect your network at four different layers to successfully fight the latest web threats. The four layers of protection are deployed in the cloud, at the Internet gateway, across network servers and at the end points. Download this whitepaper now.

rule

Spotlight Story
Security Geeks: From Isolation to Rock Stars

By Bill Brenner
Security practitioners used to be seen as propeller-hat wearing introverts hunched over computers in dark, cold basements for weeks on end, shunning daylight and anyone who tried to start a conversation with them. But times have changed. Read full story

Related News:

FAA network hacked The Federal Aviation Administration has joined the growing list of government agencies that have had their supposedly safe systems hacked. The agency this week notified about 45,000 employees that one of its servers was hacked into and employee personal identity information was stolen.

Your Identity: 'Costanza Style' Your identity is like George Costanza's wallet. Really. Think about it. Do you remember the classic Seinfeld episode? The one where George wouldn't give up his ever-expanding wallet filled with store credit cards, Irish money, a coupon for an Orlando Exxon gas station and several Sweet and Low packets. This, in spite of the obvious physical pain it caused and the security threat all of that imposed.

Largest coordinated ATM rip-off ever nets $9+ million in 30 minutes And Cisco Subnet blogger Jamey Heary explains how they did it.

Microsoft patches flaw that could compromise, cripple Exchange Microsoft Tuesday released a critical patch designed to thwart hackers who could take over Exchange Servers or shut them down with denial-of-service attacks.

Survey: 40% of hard drives bought on eBay hold personal data A New York computer forensics firm found that 40% of the hard disk drives it recently purchased in bulk orders from eBay contained personal, private and sensitive information -- everything from corporate financial data to the Web-surfing history and downloads of a man with a foot fetish.

Feds find, arrest fugitive hacker on the run in Mexico A Miami man, on the run for more than two years after being arrested and charged with stealing and reselling VoIP services, has been caught in Mexico.

New hole found in Android's browser security The browser in Google's Android mobile phone OS has another vulnerability that could let a hacker access the browser and its related data.

U.S. misses DNS security deadline The federal government missed its first deadline for rolling out DNS security mechanisms on its .gov top-level domain.

McAfee touts integrated compliance suite McAfee has taken steps to integrate its vulnerability assessment and policy management products in a single suite to make it easier for enterprises to stay on top of compliance initiatives.

Virulent Worm Exploits Missing Patches Think massive worm outbreaks are obsolete? Then say hello to the Conficker worm, aka Downadup. In January it slithered onto millions of computers unprotected by a critical patch that Microsoft had issued back in October.

Fight Back Against Cybersquatters The story you are about to read is true. The names have been changed to protect the pond scum who hijacked the name of a not-for-profit animal rescue group. Not that they deserve protection.

Verizon extends DoS detection service to 23 countries Verizon Business is extending the reach of its Denial of Service Detection service to 23 new countries, including Canada, the United Kingdom and Japan.

Wikileaks publishes $1B worth of congressional reports Wikileaks.org, the online clearinghouse for leaked documents, has published a complete database of Congressional Research Service reports, which are private research documents written for members of Congress and their staffers.

February giveaways from Cisco Subnet and Microsoft Subnet
Up for grabs: One American Express gift card worth $250 from Global Knowledge; One Microsoft training course worth $2,995 from Global Knowledge; 15 copies each of the hot book titles Voice over IP Security, and CCNA Wireless Official Exam Certification Guide and 15 copies of Exchange Server 2007 How-To: Real Solutions for Exchange Server 2007 SP1 Administrators. Get all the entry details here.


IT & social networks
where IT pros do their social networkingSurvey takes a look at where IT pros do their social networking.

Hot spot safety tips
Top 10 hot spot safety tipsHow to protect laptop data at your local Wi-Fi hot spot.

Sponsored by Trend Micro
rule

Four Layers of Security Protection.
Web threats are coming at you from every angle. This whitepaper reveals how to protect your network at four different layers to successfully fight the latest web threats. The four layers of protection are deployed in the cloud, at the Internet gateway, across network servers and at the end points. Download this whitepaper now.

rule

Effectively Managing Change.
Find the right network/system management platforms that leverage the latest IT technologies in this Executive Guide, "The New Network/System Management Challenges." Get a handle on server sprawl, managing 802.11n wireless LANs, and data center automation tool integration. Confidently deploy innovative technologies that drive efficiencies today.
Download this Executive Guide now.


Preparing for IPv6.
Get concrete facts on what IPv6 adoption means for your organization in this Executive Guide. Learn how IPv6 and IPv4 can coexist and the role of NAT devices in this new world. Find out if you need to develop a business case today and how to get started.
Download this Executive Guide now.

 

02/11/09

Today's most-read stories:

  1. Google adds ActiveSync to accommodate iPhone, Win Mobile
  2. A few clean words from the creator of Cursebird
  3. Kaspersky says Web hack 'should not have happened'
  4. Evolution of the router
  5. FTC kills fraudulent online check-processing operation
  6. Microsoft rounds out voice assault
  7. Microsoft goofs, unveils new Web-based smartphone sync service
  8. Nortel to shed shareholders meeting, more employees
  9. Don't wait for my phone: Google Sync, others here now
  10. Mommas don't let their babies grow up to be engineers


Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies.
Download this Executive Guide now.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment