Thursday, February 04, 2010

Black Hat: Zero-day hack of Oracle 11g database revealed

NASA may transform but major problems remain | Black Hat: Researcher claims hack of processor used to secure Xbox 360, other products

Network World Security Alert

Forward this to a Friend >>>


Black Hat: Zero-day hack of Oracle 11g database revealed
A well-known security researcher yesterday showed how to subvert security in the Oracle 11g database by exploiting zero-day vulnerabilities that would let a savvy user gain full and complete control. Read More


RESOURCE COMPLIMENTS OF: Zscaler

ALERT - Google was victimized by hackers. Will you be next?
Webcast with Keynote address by Peter Firstbrook, Gartner Analysts. Watch a step by step demo of an attack like the one Google suffered. Finally, hear from a customer on their experience using SaaS web security to save money and protect against emerging threats. Register Here

WHITE PAPER: WatchGuard

Avoid Compliance Violations
Protecting confidential data is serious business. Failure may result in fat fines and even jail time - not to mention damage to your brand. WatchGuard's easy-to-use, all-inclusive email and web secure content and threat prevention appliances offer a complete data protection solution. Click here.

NASA may transform but major problems remain
A GAO issued today said while NASA has had significant achievements exploring space, helping the world understand Earth's environment, and conducting fundamental aeronautical research -- it has not achieved the same level of success on its business side. Read More

Black Hat: Researcher claims hack of processor used to secure Xbox 360, other products
ARLINGTON, VA. -- A researcher with expertise in hacking hardware Tuesday detailed at the Black Hat DC conference how it's possible to subvert the security of a processor used to protect computers, smartcards and even Microsoft's Xbox 360 gaming system. Read More

House to consider cybersecurity bill on Wednesday
The U.S. House of Representatives is scheduled to vote Wednesday on a proposed bill that is designed to bolster federal cybersecurity research and development activities, and stimulate the growth of a cybersecurity workforce in the country. Read More


WHITE PAPER: Ultrium

Cost Effective Data Security with Tape
With a growing number of laws and regulations, financial penalties, and public notification costs, a security breach can be costly for corporations. Data managers are called upon to develop effective security for sensitive data and are turning to tape encryption. Read Now

PGP buys German crypto outfit to diversify
The recession continues to be no barrier to acquisitions with the news that PGP Corporation has reached into its pockets to buy German encryption services company TC TrustCenter. Read More

Twitter forces password reset to protect some accounts
Twitter required some users to reset their passwords on Tuesday after discovering that their log-in information may have been harvested via security-compromised torrent Web sites, the company said. Read More

Apple patches critical flaws in iPhone, iPod Touch
Apple today patched five vulnerabilities in the iPhone's operating system, including one in a password-locking feature that's required attention before. Read More


WHITE PAPER: Radware

Rethinking Application Security
Hacker motivation has changed from gaining fame to financial gain. Cyber crime activities now employ a new level of network attacks, which go undetected by standard network-security tools. This paper discusses the changing threat landscape and how you can protect your business from emerging threats. Read More

User provisioning: right access to the right people
Last issue we touched on a new definition for identity. Today I'd like to present the definitive view of the first, both historically as well as in the context of adding identity and access management (IAM) to your organization. User provisioning has been called the "killer app" for identity management. It started us down the road to IdM over a dozen years ago. In fact, we almost take it for granted today. But what does it involve, what does it imply, and why does it matter? Read More

At Black Hat, a search for the best response to China
Google's revelation last month that attacks out of China resulted in the theft of some of its data drew attention to the broader question at the Black Hat conference here over what can be done to the villains. Read More

Conficker worm cripples a U.K. police department
The Conficker worm is alive and well and has shut down the police network in Manchester, United Kingdom, for the past three days. Read More

SMB Signing and Security
Server Message Block security has two main components: user-level and share-level. The first is for accessing servers, and the second is for accessing files, folders, and printers if share-level authentication has been configured on the server. Most readers of this column already know about these aspects of SMB security, but you may not know about another feature called "SMB signing." This is a... Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

Massive giveaway from Cisco Subnet: 50 copies of the Cisco Press CCNP Cert Kits kits are up for grabs. Deadline March 31. 15 books on Microsoft PerformancePoint business analytics available, too.

SLIDESHOWS

10 coolest experiments from Google Labs
When you've got thousands of the world's most brilliant engineers spending 20% of their time on whatever takes their fancy, cool software is the result.

7 social SharePoint apps built in a week
Seven startups competed to develop great SharePoint apps in one week.

MOST-READ STORIES

  1. The 10 coolest experiments from Google Labs
  2. Apple releases iPhone software 3.1.3
  3. Don't ever do this while at work and on live TV
  4. 10 best IT jobs right now
  5. Researcher claims hack of processor used to secure Xbox 360
  6. Courts to ban juror use of BlackBerry, iPhone, Twitter, Facebook
  7. YouTube support of IPv6 seen in dramatic traffic spike
  8. Is Twitter losing its luster?
  9. iPhone OS 3.1.3 update brings jailbreak woes
  10. Brocade BCNE most valuable cert on earth

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment