Search This Blog

Friday, May 08, 2009

U.S. air traffic control vulnerable to cyberattack; Despite pledge, researchers release VBootkit 2.0

The weaknesses in Web applications could disrupt critical air traffic control systems
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Trend Micro
rule

Think your data is safe? Think again.
Data-stealing malware is on the rise. Trend Micro Enterprise Security, powered by the Trend Micro Smart Protection Network, blocks threats before they reach your network. Learn how. Download our Outthink the Threat eBook or register for a free, on-site assessment.

rule

Spotlight Story
Study: U.S. air traffic control vulnerable to cyberattack

By Jeremy Kirk
U.S. air traffic control systems are at high risk of attack due to their links to insecure Web applications run by aviation authorities around the country, according to a U.S. Department of Transportation audit. Read full story

Related News:

Editor's note: We will be changing how we send out Network World newsletters over the next few weeks. To ensure future delivery of your newsletters, please add nww_newsletters@newsletters.networkworld.com to your e-mail address book or 66.186.127.216 to your white-list file. Thank you.

Despite pledge, researchers release VBootkit 2.0 code Indian security researchers have released proof-of-concept code that can be used to take over a computer running Microsoft's upcoming Windows 7 operating system, despite earlier promising not to make the code public for fear it could be misused.

Virginia Dept. of Health: Prescriptions database breached but not deleted The Virginia agency in charge of an online medical-prescription database acknowledged a potential data breach of it may have occurred by refuted the notion that the entire...

Web site offline as police, FBI investigate extortion bid A week after a hacker claimed to have broken into a patient database and encrypted millions of prescription records at a Virginia health agency, its Web site remains offline except for a static Web page offering contact information.

Microsoft to patch PowerPoint zero-day bug on Tuesday Microsoft today said it will deliver just one security update next week, a fix for PowerPoint that's probably the patch for a month-old bug that developers admitted they missed during stress testing.

Low-rent hacking Cisco Subnet blogger Jimmy Ray Purser shows you how firmware can help you hack on a budget.

What does security software have to do with swine flu? Right, absolutely nothing. Yet that lack of any connection did not deter one vendor from sending us a press release with this headline: "Cyber-Ark's security helps keep Swine Flu under control."

CCIE R&S changes in store Cisco Subnet blogger Wendell Odom says the company is making changes to the written and lab exams for CCIE R&S -- and he expects the exam will be tougher than the old one by a notch ... or three.

Symantec sees slowdown in security sales Citing a slowdown in sales of its security and compliance products and weakness in international currencies, Symantec said Wednesday that it would post a $249 million loss for the quarter ending April 3.

Swine Flu: Now That the Hype Is Over, Keep Planning It's always hard telling people they shouldn't panic while also telling them they need to take their disaster preparedness more seriously. It's far too easy to come across as a waffler. Yet here I am, about to suggest something that might appear to contradict what I opined about last week -- see: Swine Flu: To Fear is to Fail.

May Giveaways
Cisco Subnet
, Microsoft Subnet and Google Subnet are collectively giving away books on Google Apps Deciphered, the CCNA Security exam, an awesome SQL Server 2005/2008 training video and the grand prize, a Microsoft training course from New Horizons worth up to $2,500. Deadline for entries May 31.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Evolution of Ethernet
Evolution of Ethernet From 3Mbps over shared coax to 40/100Gbps over fiber…and beyond.

Apple iPhoneys: The 4G edition
Apple iPhoneys: The 4G editioniPhone enthusiasts from around the Web offer their visions for the next-gen iPhone.

Sponsored by Trend Micro
rule

Think your data is safe? Think again.
Data-stealing malware is on the rise. Trend Micro Enterprise Security, powered by the Trend Micro Smart Protection Network, blocks threats before they reach your network. Learn how. Download our Outthink the Threat eBook or register for a free, on-site assessment.

rule

EMA: Refining privilege access security.
Close the security gaps in high-privilege access control and authentication by selecting the right security products for the job. This whitepaper, "Resolving the Privilege Management Paradox," details how. EMA outlines how to find products that offer strong shared access management, better control and clear visibility and multifactor authentication.
Click to download.


Everybody says "Do more with less!"
But no one tells you how. We will and it costs nothing to find out at IT Roadmap Conference and Expo. Coming to 10 cities in 09.
Register now, attend free

 

05/08/09

Today's most-read stories:

  1. The Internet sky really is falling
  2. Utility's plan to lessen fire risk it caused?
  3. Sweden may prosecute Cisco hacker
  4. Death of the mouse
  5. Why BlackBerry still beats iPhone for some
  6. Top 7 reasons people quit Linux
  7. Increasing Internet security for average users
  8. IPv6 security guru fields questions
  9. Domain name company cries croc tears over 'censorship'
  10. Holy Grail VMware bug: jump through a Windows VM, control the host
  11. Notebook replaces trackpad with LCD panel


Network World on Twitter: Get our tweets and stay plugged in to networking news


Metzler: 2009 Handbook of Application Delivery
Successful IT organizations must know how to make the right application delivery decisions in these tough economic times. This handbook authored by WAN expert Jim Metzler will help guide you.
Download now



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: