Friday, August 28, 2009

New attack cracks common Wi-Fi encryption in a minute; How to keep Big Brother from tracking cell phone

New attack cracks common Wi-Fi encryption in a minute; How to keep Big Brother from tracking cell phone
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile


Sponsored by Juniper Networks
rule

Dynamic Security in the Virtualized Data Center Network
Virtual data centers are creating new communications patterns within the network which cannot be secured by conventional, perimeter-oriented designs. Join Juniper Networks for a live Webcast on how to protect your data center's network, extend protection across new data flows, simplify management of policy rules and consolidate separate infrastructures.

Register now.

rule

Spotlight Story
Researchers target system to surgically jam specific digital signals

Electronically jamming everything from specific cell phones, satellites or any other communications device is the goal of a prototype system military scientists at Defense Advanced Research Projects Agency want to build. Read full story

Related News:

New attack cracks common Wi-Fi encryption in a minute
Computer scientists in Japan say they've developed a way to break the WPA encryption system used in wireless routers in about one minute.

How to keep Big Brother from tracking cell phone
Network providers gather data that tracks where customers go with their cell phones, a potential privacy infringement that researchers are trying to eliminate.

Software that turns cell phones into bugs is tough to beat
It may be impossible to defend cell phones against being used as bugs because it is difficult to tell legitimate applications that need to use the phones' cameras and microphones from those that abuse them, researchers say.

Apple adds basic anti-malware to Snow Leopard
Apple has expanded a download warning feature in Mac OS X 10.5 to create rudimentary anti-malware detection in the new Snow Leopard operating system due out Friday.

ACLU sues for information on laptop searches at U.S. borders
The American Civil Liberties Union is suing the U.S. Department of Homeland Security (DHS)'s Customs and Border Protection (CBP) unit for information on its policies related to searches of laptops and other electronic devices at U.S. borders.

Facebook and Twitter users failing on security
Just 27 percent of social networkers are protecting themselves against online threats, says AVG.

DHS report: IT sector is resilient against serious cyberattacks
A U.S. Department of Homeland Security presents scenarios in which well-chosen attacks against key IT infrastructure elements could cause disruptions on a national scale. The document also offers a surprisingly sunny assessment of the resilience and redundancies within the IT sector to mitigate the risk of such disruptions.

August Giveaways
Cisco Subnet is giving away training from Global Knowledge and 15 copies of Practical Intrusion Analysis; Microsoft Subnet is giving away training from Global Knowledge and 15 copies of SCCM 2007 Unleashed. Google Subnet is giving away 15 copies of Web Geek's Guide to Google Chrome. Entry forms can be found on the Cisco Subnet, Microsoft Subnet and Google Subnet home pages. Deadline for entries is August 31.

Network World on Twitter? You bet we are


10 sports technologies to love, 5 to hate
Sports technologiesMany technologies help fans enjoy sports. Others just annoy.

Apple disasters
Apple disastersApple has enjoyed huge success with the iPod and iPhone, but Apple has had a number of commercial flops, too.

Virtualization on IBM System Z Advantages
Not all virtualization solutions are created equal. You can achieve up to 80% savings on energy and floor space and up to a 90% reduction on software license fees. Learn about the cost savings, security benefits and unique approach Red Hat provides with open source virtualization integrated into the operating system kernel.
Learn More


Sophos Security Solution Center
With the threat landscape constantly changing, you need to have comprehensive protection that isn't complicated. With Sophos, you get complete protection for less investment. You get best-in-class threat protection, and data security and compliance that are simple and affordable so you can get more out of your existing security budget. Review timely resources at this Solution Center.
Visit this site today!

 

August 28, 2009

TOP STORIES | MOST DUGG STORIES

  1. High-tech blimps earning their wings
  2. The opposite of Twitter
  3. 5 techs that could reinvent cell phones
  4. 12 words you can never say in the office
  5. Wi-Fi encryption cracked in 60 seconds
  6. Cisco's fastest router just got faster
  7. Marines want lots of robots to throw
  8. Group attacks Windows 7's 'sins'
  9. Microsoft, Citrix no longer sponsoring VMworld
  10. Judge overturns 2007 Unix copyright decision

It's Easy to Win a Flat Screen
Presented by: CIO, Computerworld, CSO, InfoWorld & Network World -- Security Directions: A Virtual Conference Protecting Your Enterprise in a Dynamic Infrastructure -- Date: September 29, 2009 Time: 9:30am - 6:30pm -- On Sept. 29th, IDG will host a unique online event on security. Join CSO publisher, Bob Bragdon and a panel of experts and users, to hear about real-world security deployments. And just for attending, you'll have a chance to win a flat screen LCD TV.
Register Now!



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment