Editor's note: We will be changing how we send out Network World newsletters over the next few weeks. To ensure future delivery of your newsletters, please add nww_newsletters@newsletters.networkworld.com to your e-mail address book or 66.186.127.216 to your white-list file. Thank you. The good cyberattack NRC report deals with policy issues of the United States mounting cyberattacks on bad guys, other countries. Post-breach, Heartland plans aggressive encryption project Heartland Payment Systems intends to deploy end-to-end encryption with its merchants to protect its payment processing system from cybercriminals. 'Hacker' threatens to expose health data, demands $10M Days after a hacker claimed to have broken into a database and encrypted millions of prescription records at Virginia's Department of Health Professions, it remains unclear what happened. Cellcrypt for BlackBerry Secures Cellular Voice Conversation The BlackBerry platform is known for its impressive security safeguards; Research In Motion's (RIM) BlackBerry Enterprise Server (BES) is literally designed from the ground up to meet enterprise security needs, and its various international security certifications attest to its effectiveness. However, there's one component of the BlackBerry ecosystem that's largely unguarded from potential threats: phone calls, i.e., voice traffic. SOA Security: How Irish Luck Went a Long Way From a security perspective, service oriented architecture (SOA) is a tricky thing. It's not hard for bad guys to compromise it with SQL injection, capture-replay and XML denial-of-service attacks, which they can ultimately use to bust through walls around a company database. Video: Inside the Enigma: Not a Riddle Neal Weinberg gets a special sneak peek inside the Enigma device, which was used by the Allies in World War II to help crack German codes. IPv6 security guru fields questions Although he acknowledges that businesses have yet to embrace IPv6, security guru Scott Hogg says that doesn't mean IT executives can ignore the security problems that the next generation Internet protocol can present. After all, he notes, operating systems such as Microsoft Vista and Linux are already IPv6 capable and thus any networks that use them might be handling IPv6 traffic without their operators' knowledge. Sweden may prosecute Cisco hacker The Swedish man indicted by U.S. authorities for the alleged 2004 theft of source code for Cisco's IOS software may be prosecuted in his home country. Swedish man indicted in 2004 Cisco code theft A Swedish man was indicted on Tuesday in connection with the alleged 2004 theft of source code for Cisco Systems' IOS (Internetwork Operating System) software. May Giveaways Cisco Subnet, Microsoft Subnet and Google Subnet are collectively giving away books on Google Apps Deciphered, the CCNA Security exam, an awesome SQL Server 2005/2008 training video and the grand prize, a Microsoft training course from New Horizons worth up to $2,500. Deadline for entries May 31. Network World on Twitter Get our tweets and stay plugged in to networking news. |
No comments:
Post a Comment