Friday, September 04, 2009

iPhone passcode bugs revealed; Has US been unfairly torched over the electronic waste disposal issue?

Has US been unfairly torched over the electronic waste disposal issue?; iPhone passcode bugs revealed
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile


Sponsored by Double-Take Software
rule

Thinking Beyond Tape: The Case Against Tape Backup
Many companies are already backing up their main and branch office systems to tape, but what they don't understand is just how vulnerable their data and their business remains. This video whitepaper explores the high cost, complexity and potentially dangerous shortcomings of a strategy based only on tape backup.

Learn more.

rule

Spotlight Story
Red Hat widens Java support, aims at cloud with new middleware

Red Hat this week made available its JBoss Enterprise Application Platform (EAP) 5.0, the foundation for the vendor's new Java-based middleware strategy and a core element of its emerging cloud plans. Read full story

Related News:

Has US been unfairly torched over the electronic waste disposal issue?
Is it possible the US has been unfairly torched over the issue of electronic waste disposal? According to a study released this week more computers discarded by consumers in the United States are getting a second life in developing countries, or at least in Peru, than previously reported.

iPhone passcode bugs revealed
It has already been proven that the passcode on an iPhone can be removed. The purpose of this article is to point out the false sense of security delivered through Apple's marketing of iPhone features for the enterprise. My testing has revealed that the enterprise security features do not behave correctly and I will point out three flaws with how passwords are handled with the iPhone and EAS.

BBN, Raytheon and a fresh JFK conspiracy theory
Because lots of good stuff goes unnoticed in comment strings ... Earlier this week we learned that Raytheon, long one of the nation's most powerful defense contractors, is acquiring venerable BBN Technologies, a networking pioneer perhaps most famous for its role in designing the ARPANET, precursor to the Internet.

Turn an Old Floppy Into a Password Safe
Think back. Wayyy back. Remember floppy disks? If you're like me, you've probably got a box of them in a closet, serving absolutely no practical use. (When was the last time you owned, or even used, a computer with a floppy drive?)

Court allows suit against bank for lax security
A couple whose bank account was breached can sue their bank for its alleged failure to implement the latest security measures designed to prevent such compromises.

Is the Internet really a safe place when ignoring IPv6?
Today, I had a great read: a 114-page report from the US Department of Home Security (http://www.it-scc.org/documents/IT_Sector_Risk_Assessment_Report_Final.pdf). This report claims that the Internet infrastructure is well secured and is resilient against attacks. This report is well written and covers notably how the DNS infrastructure is protected (by anycast servers and other mechanisms). Read...

Why the Cisco ASA firewall needs NetFlow support
Due to the untraditional export of NetFlow from the Cisco ASA firewall, network traffic analysis vendors to date have shied away from figuring out this enigma. Nonetheless, network traffic analysis vendor Plixer International decided to tackle it and announced this week support for NetFlow exported from the ASA in Plixer's latest traffic analysis software release, Scrutinizer v7. Naturally,...

Microsoft Subnet is giving away training from New Horizons and 15 copies of Windows Server 2008 How-To. Cisco Subnet is giving away 15 copies of Interconnecting Data Centers Using VPLS. Google Subnet is hosting many new bloggers (watch for giveaway information soon.) Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


10 sports technologies to love, 5 to hate
Sports technologiesMany technologies help fans enjoy sports. Others just annoy.

Apple disasters
Apple disastersApple has enjoyed huge success with the iPod and iPhone, but Apple has had a number of commercial flops, too.

Dynamic Security in the Virtualized Data Center Network
Virtual data centers are creating new communications patterns within the network which cannot be secured by conventional, perimeter-oriented designs. Join Juniper Networks for a live Webcast on how to protect your data center's network, extend protection across new data flows, simplify management of policy rules and consolidate separate infrastructures.
Register now.


Sophos Security Solution Center
With the threat landscape constantly changing, you need to have comprehensive protection that isn't complicated. With Sophos, you get complete protection for less investment. You get best-in-class threat protection, and data security and compliance that are simple and affordable so you can get more out of your existing security budget. Review timely resources at this Solution Center.
Visit this site today!

 

September 04, 2009

TOP STORIES | MOST DUGG STORIES

  1. Raytheon snaps up Internet pioneer BBN Technologies
  2. The 11 most influential microprocessors of all time
  3. Developer denies software to beat Chinese censors is malicious
  4. Cisco, EMC starting new joint venture company?
  5. Wi-Fi encryption cracked in 60 seconds
  6. Half of new servers are virtualized, survey finds
  7. 12 cool ways to donate your PC's spare processing power
  8. Still trying to crack Nazi Enigma messages
  9. Snow Leopard vs. Windows 7
  10. 12 words you can never say in the office

Closing the Risk Gap in Privileged Access Control
In this whitepaper, Enterprise Management Associates (EMA) examines this critical issue in IT security administration in light of the Symark approach to helping businesses move from a trust-based system to a secure, auditable process in order to provide a higher standard of control and better support for regulatory compliance.
Learn More



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



1 comment:

  1. Anonymous9:47 PM

    buy tramadol online tramadol hcl 50 mg addiction - buy tramadol online no prescription overnight

    ReplyDelete