Search This Blog

Friday, October 23, 2009

Gaping security hole turned 64,000 Time Warner cable modems into hacker prey

Privacy advocate has ally in Social Security numbers fight; A $30 Billion US census?
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by IBM
rule

Security convergence equals network security cost savings
Listen to IBM Internet Security Systems' take on network security convergence. You will learn how to get more out of your existing investments in network security, combat new Web 2.0, Web application and database threats without purchasing stand alone technologies, and how to protect your company from worms to botnets to preventing data leaks.

View this webcast!

rule

Spotlight Story
Gaping security hole turned 64,000 Time Warner cable modems into hacker prey

A blogger helping to tune a friend's wi-fi network uncovered a gaping security hole in Wi-Fi cable modem routers installed in 64,000 Time Warner subscribers' homes, leaving them open to attack. Read full story

Related News:

Privacy advocate has ally in Social Security numbers fight
A fight to stop a Virginia privacy advocate from republishing on her Web site Social Security numbers obtained legally from public records on government sites is attracting the attention of some privacy heavyweights.

A $30 Billion US census?
The number seemed staggering, but there it was. The cost of conducting the census has, on average, doubled each decade since 1970. If that rate of cost escalation continues into 2020, the nation could be looking at a $30 billion census.

Taking the 'Closed' Out of CCTV
CCTV surveillance systems are notoriously proprietary. (Hey, those circuits are "closed", after all.) The IP networking protocol is generally thought of as an 'open' system - but that doesn't mean all IP-based surveillance devices work together.

Almost half ISO 27001 'compliant' firms break with security
Almost half of businesses that claim compliance with ISO 27001 are sharing privileged user accounts and breaking other standard guidance, according to a survey of IT managers.

Understanding and implementing information security metrics
One of the cornerstones of the scientific method is measurability: a focus on defining the ways of counting or measuring aspects of reality that we hope will be strongly associated with the phenomena we are trying to understand.

Why is Cisco a better choice over Blue Coat?
Being asked why I would take Cisco over Blue Coat in a choice of vendors and products has led me to the following reasons. I would hope that the marketing teams of both companies who take so much time out of their days posting to other blogs would take the same amount of time to post to this blog. I know it is very hard from marketing teams to talk about thier products in a good way, since they...

Microsoft Subnet is giving away training from Global Knowledge and 15 copies of Microsoft Expression Web 3 In Depth. Cisco Subnet is giving away training from Global Knowledge and 15 copies of Building Service-Aware Networks. Google Subnet is hosting many new bloggers. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


Ethernet everywhere!
Ethernet everywhereInside planes, trains, cars and spaceships, Ethernet is a morph master. Here's a look at some of Ethernet's cooler implementations.

7 tools to ease Windows 7 rollout
Windows 7These utilities help you plan, ensure app compatibility and manage images.

Vulnerability Management Checklist
Discover the 12 key decision points you need to consider when choosing a vulnerability management solution. This checklist walks you step-by-step through critical questions to ensure you select the solution that will best protect your network and data.
Learn more now.


Forrester Research Total Economic Impact Analysis of WAN Optimization
Forrester Research provided detailed analysis of WAN Optimization ROI based on in-depth interviews with 9 enterprises. This paper summarizes the ROI, benefits and IT flexibility provided by a typical WAN optimization deployment.
Learn More Now

 

October 23, 2009

MOST-READ STORIES

  1. Goodbye steering wheel, here comes drive-by-joystick
  2. 10 people you won't see at Microsoft's Windows 7 launch party
  3. Microsoft, Dell, Spectrum Bridge launch first public white spaces network
  4. Gartner on cloud security: "Our nightmare scenario is here now"
  5. Geek pranks: 15 high-tech tricks to haunt your co-workers
  6. IT pay cuts: Are you next?
  7. IBM takes aim at Windows 7 with new desktop offering
  8. Windows 7 more popular than Harry Potter
  9. The top 7 roadkill victims on the journey to Windows 7
  10. Security hole turned 64,000 Time Warner cable modems into hacker prey

Identity Management E Guide
Identity management cannot be ignored – it is the key to preventing data breaches. This Network World Executive Guide provides in-depth information on today's most pressing security issues.
Read More



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments: