Search This Blog

Monday, February 08, 2010

US developing extreme digital forensic wizard

IE flaw gives hackers access to user files, Microsoft says | Unique network security algorithm stops worms from spreading

Network World Security Alert

Forward this to a Friend >>>


US developing extreme digital forensic wizard
Can anything you create digitally - software code, e-mail or documents - be traced back to you like so much DNA from a crime scene? Research scientists at the Defense Advanced Research Projects Agency (DARPA) seem to think so as they announced this week the $43 million Cyber Genome Program it hopes will develop technologies that will help law enforcement types collect, analyze and identify all manner of digital artifacts. Read More


WHITE PAPER: Cisco Systems Inc.

Lowering Wireless Data Costs with WAN Optimization
Dramatically lower your wireless data costs while significantly speeding applications with mobile WAN optimization tools. Fuji Xerox Australia describes the benefits it has seen since its deployment in this whitepaper. Learn how you can save 30% on 3G data costs while improving application throughput by 20 times. Learn More

WHITE PAPER: Trend Micro

Effectively Deal with Security Threats in Real-Time
Eliminate costly and time-consuming manual security processes with a network security overwatch layer. Raise the bar on security protection within your organization. Find out why an overwatch layer should be part of your best practice security requirements. Read now.

IE flaw gives hackers access to user files, Microsoft says
Microsoft warned on Wednesday that a flaw in its Internet Explorer browser gives attackers access to files stored on a PC under certain conditions. Read More

Unique network security algorithm stops worms from spreading
Researchers at Pennsylvania State University say they can block the spread of self-propagating worms on corporate networks while keeping infected machines online so they can continue performing their legitimate duties. Read More

Fake Firefox update spreads unwanted app
The successor program to the notorious Zango spyware Toolbar is being used to target users of Mozilla's Firefox with fake browser updates, a security company has alleged. Read More


WHITE PAPER: Radware

Rethinking Application Security
Hacker motivation has changed from gaining fame to financial gain. Cyber crime activities now employ a new level of network attacks, which go undetected by standard network-security tools. This paper discusses the changing threat landscape and how you can protect your business from emerging threats. Read More

NASA teams with GM to build human-like robot
NASA today teamed up with General Motors to build a new humanoid robot known as Robonaut2 Read More

Too many people re-use logins, study finds
An analysis of real-world online behaviour has warned of the unsettling phenomenon that led to this week's high-profile Twitter login scare. Far too many people re-use the same logins for more than one site. Read More

Courts move to ban juror use of Blackberry, iPhone, Twitter and Facebook
If you think you're going to use your spanking new iPhone to entertain yourself next time you're on jury duty, think again.  Judges are going to take an even dimmer view of jury member use of Blackberry, iPhone or other electronic devices as a judicial policy-setting group has told district judges they should Read More


WHITE PAPER: Microsoft

Direct Access and UAG Better Together
Direct Access (DA) is a game-changing technology for remote access in your company; removing the need for a VPN all together. Within Microsoft, we've seen great productivity benefits to end users. We surveyed users from our DA pilot and over 87% saw instant productivity gains, overall resulting in net benefit of ~1 hour each day for users. Furthermore, Microsoft operations is saving costs by things such as not having to convert internet connected sites to dedicated lines. For more information on the business value of DA and Microsoft's implementation, watch the Direct Access MSIT video. Learn More Now

Facebook comes out swinging at critics of settlement offer in Beacon lawsuit
Facebook has come out swinging at those opposing a settlement offer it made last year in a privacy lawsuit involving the social networking companys controversial Beacon behavioral tracking service. Read More

Versign fails to take action against malicious sites, researcher says
A security researcher is accusing Verisign Inc. of not acting fast enough to take down several dozen sites that he says are known to be spewing malware. Read More

Google Working With National Security Agency, Report Says
In a partnership that may inspire some to put their tinfoil hats on, Google has reportedly turned to the National Security Agency for help in improving the company's security infrastructure. The new partnership is still being finalized, but will be aimed at preventing future attacks like the one that hit Google in December, according to The Washington Post. This is not the first time the NSA has been tapped to help a U.S. corporation with cyber security, but the purported partnership would certainly be unique since Google's servers house such a vast collection of user data including search histories, e-mail, and personal documents. Read More

Social Media Risks: The Basics
You may be a champ at Mafia Wars and Farmville, but what do you know about the security risks of social media sites? Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

Massive giveaway from Cisco Subnet: 50 copies of the Cisco Press CCNP Cert Kits kits are up for grabs. Deadline March 31. 15 books on Microsoft PerformancePoint business analytics available, too.

SLIDESHOWS

10 coolest experiments from Google Labs
When you've got thousands of the world's most brilliant engineers spending 20% of their time on whatever takes their fancy, cool software is the result.

7 social SharePoint apps built in a week
Seven startups competed to develop great SharePoint apps in one week.

MOST-READ STORIES

  1. Cisco backdoor still open
  2. How Wi-Fi attackers are poisoning Web browsers
  3. Microsoft slates colossal Windows patch next week
  4. 10 best IT jobs right now
  5. IE flaw can turn your PC into a public filer server
  6. Microsoft's Patch Tuesday to be all about required reboots
  7. The 10 coolest experiments from Google Labs
  8. 9-year-old plots his fifth Microsoft certification
  9. iPhone, BlackBerry users can make VoIP calls over 3G
  10. Fake Firefox update spreads unwanted app

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: