Search This Blog

Monday, February 01, 2010

Black Hat: security researchers to target Adobe Flash, Web design flaws

Chrome apes IE8, adds clickjacking, XSS defenses | Ponemon Institute: Data breach costs climb; cyber attacks happen hourly

Network World Security Alert

Forward this to a Friend >>>


Black Hat: security researchers to target Adobe Flash, Web design flaws
Security researchers at the Black Hat Conference in Washington D.C., will demonstrate what they see as Adobe Flash design flaws as well as show how the failure to apply known cryptographic controls to the ViewState in Web app frameworks can lead to problems Read More


WHITE PAPER: WatchGuard

Avoid Compliance Violations
Protecting confidential data is serious business. Failure may result in fat fines and even jail time - not to mention damage to your brand. WatchGuard's easy-to-use, all-inclusive email and web secure content and threat prevention appliances offer a complete data protection solution. Click here.

WHITE PAPER: St. Bernard

6 Steps to Evaluating Web Filtering
Web filtering that doesn't compromise network performance is just one of the critical steps when considering this technology. This paper guides you through the pros and cons of a software-based solution vs. an appliance-based filter and advises on considerations ranging from implications of your acceptable use policy to properly authenticating individuals. Read More

Chrome apes IE8, adds clickjacking, XSS defenses
Google yesterday announced it has added several new security features to Chrome, including two that were first popularized by rival Microsoft in Internet Explorer 8 last year. Read More

Ponemon Institute: Data breach costs climb; cyber attacks happen hourly
Mike Spinney, senior privacy analyst with the Ponemon Institute, explains how privacy and security have changed in the past year and what high-tech leaders need to know to protect themselves now. (10:58) Read More

Venerable B-52 bomber gets network centric
One would guess that when its designers saw their first B-52 fly in 1954, they never envisioned nor worried about it being part of network centric warfare.  They might not have guessed the B-52 woul Read More


WHITE PAPER: Cisco Systems Inc.

Effectively Optimize your SSL VPN
Guarantee your SSL VPN is operating at peak performance by selecting a robust and cost-effective WAN optimization solution. Support a secure and low-latency VPN that allows employees to work productively from anywhere. Download this whitepaper to learn more. Learn More

EFF: Browsers can leave a unique trail on the Web
The Electronic Frontier Foundation has created an on-line tool that details the wealth of information a Web browser reveals, which can pose privacy concerns when used to profile users. Read More

FBI arrests alleged cable modem hacker
U.S. federal authorities arrested a 26-year-old man on Thursday for allegedly selling modified cable modems that enabled free Internet access, according to the U.S. Department of Justice. Read More

US House leaders ask for investigation into hackings
Two lawmakers criticized the Web services company that may have enabled the hacking of almost 50 government Web sites on Wednesday. Read More


WHITE PAPER: Microsoft

Direct Access and UAG Better Together
Direct Access (DA) is a game-changing technology for remote access in your company; removing the need for a VPN all together. Within Microsoft, we've seen great productivity benefits to end users. We surveyed users from our DA pilot and over 87% saw instant productivity gains, overall resulting in net benefit of ~1 hour each day for users. Furthermore, Microsoft operations is saving costs by things such as not having to convert internet connected sites to dedicated lines. For more information on the business value of DA and Microsoft's implementation, watch the Direct Access MSIT video. Learn More Now

Fake antivirus scam hits Facebook
Facebook users are being bombarded with fake virus alerts designed to encourage social networkers to download fake antivirus software, says PandaLabs. Read More

Consolidate your security services infrastructure onto one scalable virtual platform
In the server consolidation wave, one area that is ripe for consolidation is security services. Today's security service infrastructure is primarily built on appliances, which have a way of proliferating like bunnies. What if you could take 800 Cisco firewalls and their incumbent networking infrastructure and collapse them down to one highly scalable virtual security platform? No problem. Read on to learn how. Read More

Scammers Hop on iPad Bandwagon
iPad search results may contain poisoned links that lead to rogue antivirus software, as fraudsters unleash a favorite malware-pushing tactic. Read More

Critical Infrastructure under Siege from Cyber Attacks
A new report from McAfee--In the Crossfire: Critical Infrastructure in the Age of Cyber War--suggests that the use of cyber-attacks as a strategic weapon by governments and political organizations is on the rise. The survey follows closely on the heels of the attacks on Google and a number of other companies, which Google has declared were initiated by the government of China itself. Read More

Phishing scam targets users of Adobe PDF Reader
A new phishing scam is trying to fool people into thinking it comes from Adobe, announcing a new version of PDF Reader/Writer. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

New giveaways! Win a year's worth of 24/7 video training from ClipTraining. Win books on WS2008 R2, Cisco WAAS and the CCIE. Deadline Jan. 31. Plus: On Cisco Subnet: Are two routers enough to study for the CCNA? On Microsoft Subnet: AxCrypt: Open Source tool for encrypting files; On Google Subnet Google's reports blockbuster Q4, modest FY09.

SLIDESHOWS

12 years of big-time Apple innovations
From the iMac to the iPad, here are the biggest releases of the second Steve Jobs era.

10 Gigabit data center switch shootout
We tested six top-of-rack data center switches 10 ways to Sunday.

MOST-READ STORIES

  1. 'WiMAX 2' coming in 2011?
  2. Brocade BCNE most valuable cert on earth
  3. NSF earmarks $30M for game-changing Internet research
  4. Apple iPad could give Microsoft fits
  5. IBM, researchers to develop controversial lithium air battery
  6. Worst cities to work in IT: International edition
  7. Did Apple's iPad debut put a choke-hold on the Internet?
  8. 10 great iPhone apps for business users, at a glance
  9. Facebook and Twitter? Why not just put a gun to your head?
  10. iPad data demands could cripple AT&T 3G

Network World on Twitter? You bet we are

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Update your profile | Terms of Service/Privacy

Copyright Network World, Inc., 2010

Network World, Inc.,, 492 Old Connecticut Path, Framingham, MA 01701


No comments: