Thursday, April 23, 2009

Intel CPU cache poisoning: Dangerously easy on Linux; Einstein boxes

Security companies commit Anti-Virus 'Piracy'; Paradise Lost: Malware Targets Macs
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Oracle
rule

Webcast: Maximizing your IT security dollars
Make the most of IT security and compliance dollars by ensuring your databases are secure. Get concrete tips and recommendations in this Webcast sponsored by Oracle. Learn how to cost-effectively safeguard sensitive and regulated information. Learn More.

rule

Spotlight Story

Intel CPU cache poisoning: Dangerously easy on Linux
A researcher has created proof-of-concept exploit code on an ultra stealthy attack against Intel CPUs. One security expert explains the attack and why it is so potentially dangerous. Read more.

Related News:

Editor's note: We will be changing how we send out Network World newsletters over the next few weeks. To ensure future delivery of your newsletters, please add nww_newsletters@newsletters.networkworld.com to your e-mail address book or
66.186.127.216 to your white-list file. Thank you.

Controversial Einstein systems to inspect U.S. government's Internet traffic The largest U.S. carriers -- including AT&T, Qwest and Sprint -- are deploying special-purpose, intrusion-detection systems dubbed Einstein boxes in their networks as part of an 18-month-old effort to tighten security on federal networks.

Security companies commit Anti-Virus 'Piracy' on unsuspecting users A Better Windows World blogger Ron Barrett looks at a friend's computer where the antivirus, the most important portion of the security suite is not protecting the computer. What has become unbelievable to me is that at $49- $79 a pop they immediately stop protecting persons PC’s from the most serious threat of all VIRUSES!

Paradise Lost: Malware Targets Macs With researchers reporting the first Macintosh-specific malware to be found "in the wild" on the Internet, Mac users want to know what to do. My advice: Nothing. But, this is a good news/bad news story.

VMware to embed RSA security into vSphere 4 Embedded security promised for VMware’s new vSphere cloud computing platform based on RSA’s data-loss prevention and encryption technologies.

Are We Already Losing the Cyber War? Wouldn't it be great to read on Xinhua, the Chinese news agency, reports that American cyber spies have penetrated the Chinese electric grid and may have left software behind that would allow Washington to plunge the People's Republic into darkness?

'Gang of six' controls botnet of 1.9 million computers Criminals have built a massive "botnet" network of hacked computers that has infected an estimated 1.9 million computers worldwide, including systems within U.S. and U.K. government networks, security vendor Finjan reported Tuesday.

Hacker vs. hacker The Register ran a long article to the effect of "A guy tried to engage in pedophile activity and got off with a slap on the wrist because he informed on hacker...

One bot-infected PC = 600,000 spam messages a day Some bot-infected PCs can crank out as many as 25,000 spam messages per hour, new research released Wednesday claimed.

Cisco introduces IPS card for ASA 5505 Cisco Subnet blogger Jamey Heary details how adding an intrusion-detection card to the ASA 5505 will ramp up protection.

When the FBI Raids a Data Center: A Rare Danger As part of coordinated raids in early April, FBI agents seized computers from a data center at 2323 Bryan Street in Dallas, Texas, attempting to gather evidence in an ongoing investigation of two men and their various companies accused of defrauding AT&T and Verizon for more than $6 million.

Day Two RSA 09: Confessions of a Booth Troll Feet hurt, back aches, conference center food making the worst smelling farts I have let since the Tennessee Chili Cook Off of 1999. Welcome to Day Two of RSA San...

Government, military officials at RSA warn of cyber-threats Cybercrime and military cyber-defense plans were aired by U.S. government officials during the RSA Conference yesterday.

RSA chief calls for inventive collaboration among vendors Two years after suggesting that independent security vendors were headed for extinction, Art Coviello, president of RSA, is calling for "inventive collaboration" among vendors for dealing with the expanding range of threats facing business and government.

NAC can't get untracked Five years after it burst on the scene as a response to the Blaster and Sasser worms, network access control has yet to make significant inroads into corporate networks.

RSA's Coviello calls on security vendors to take lead in fighting cybercrime Network security vendors need to cooperate more with each other and with the government to effectively fight cybercriminals, state-sponsored cyberspying and cyber terrorists,...

Shavlik puts cheap AV into patching system Patching-to-security company Shavlik has announced the latest version of its NetChk Protect 7.0 software with a little surprise for the faithful. From version 7.0 on, anti-virus has been integrated at "insignificant" cost.

Trend Smart Surfing protects users from online scams Trend Micro on Wednesday announced the release of Trend Smart Surfing for Mac. It's $70; a 30-day free trial is available for download.

Top Trends: Patch Management Find out how patch-management products work, and what they can do for you, in this Product Guide.

April giveaways galore
Cisco Subnet
and Microsoft Subnet are giving away training courses from Global Knowledge, valued at $2,995 and $3,495, and have copies of three hot books up for grabs: CCVP CIPT2 Quick Reference by Anthony Sequeira, Microsoft Voice Unified Communications by Joe Schurman and Microsoft Office 2007 On Demand by Steve Johnson. Deadline for entries April 30.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Evolution of Ethernet
Evolution of Ethernet From 3Mbps over shared coax to 40/100Gbps over fiber…and beyond.

Apple iPhoneys: The 4G edition
Apple iPhoneys: The 4G editioniPhone enthusiasts from around the Web offer their visions for the next-gen iPhone.

Sponsored by Oracle
rule

Webcast: Maximizing your IT security dollars
Make the most of IT security and compliance dollars by ensuring your databases are secure. Get concrete tips and recommendations in this Webcast sponsored by Oracle. Learn how to cost-effectively safeguard sensitive and regulated information. Learn More.

rule

Cut Campus Network TCO by 50%.
Learn how to reduce your campus networks' TCO by up to 50% without compromising high performance, security or reliability. Juniper Networks shows you how to achieve unparalleled consistency, flexibility and efficiency for the lowest possible TCO.
Click here to register for this Live April 30 Webcast.


DNS news and tips
DNS is not secure and is extremely vulnerable. DNS is at the core of every connection we make on the Internet. While some servers are indeed vulnerable, because of inadequate management or knowledge, the real threat is from the protocol itself and how data is easily subverted or faked as it moves around the internet.
Receive the latest DNS news and tips

 

04/23/09

Today's most-read stories:

  1. Six things that could ruin Twitter (and five that won't)
  2. 100 Gigabit Ethernet: Bridge to Terabit Ethernet
  3. Apple iPhoneys: The 4G edition
  4. VMware vows to overhaul data center with "cloud operating system"
  5. The FBI as an ethical hacker?
  6. The biggest loser in Oracle-Sun deal: SAP
  7. Why the Oracle/Sun deal is bad news for Microsoft and SQL Server
  8. AT&T expands its contact center portfolio
  9. OpenSolaris, Linux could merge under Oracle
  10. Microsoft could be a winner in Sun-Oracle deal
  11. Honda demos motion-assistance devices


Network World on Twitter: Get our tweets and stay plugged in to networking news


Metzler: 2009 Handbook of Application Delivery
Successful IT organizations must know how to make the right application delivery decisions in these tough economic times. This handbook authored by WAN expert Jim Metzler will help guide you.
Download now



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment