Friday, March 05, 2010

Researchers zap RSA security scheme; Underrated computing threats

Underrated computing threats you need to know about | The old privacy versus security debate

Network World Security Alert

Forward this to a Friend >>>


Researchers find way to zap RSA security scheme
Three University of Michigan computer scientists say they have found a way to exploit a weakness in RSA security technology used to protect everything from media players to smartphones and e-commerce servers. Read More


E-GUIDE: Compuware

5 Tips for Getting the Best Web App Performance
This eBook, compiled by Network World, explores the pressing issues, from dealing with outages and evaluating performance monitoring services, to the impact of virtualization. Get expert tips to optimize your Web apps. Learn More Now

WEBCAST: Actuate

Discover BIRT.
Understand how BIRT simplifies and speeds to market the development of rich information applications. In this presentation, a technical expert behind BIRT will demonstrate a customer-facing application in action with Flash, Ajax, and JavaScript interactivity. Click Here!

Underrated computing threats you need to know about
There's the danger you know, and then there's the danger you don't know. Read More

The old privacy versus security debate
There's been an ongoing debate over the last decade about how best to balance privacy versus security in the context of homeland security. Can the government tap our phones or e-mail accounts in order to thwart a possible terrorist plot? Do we have to open our bags to TSA screeners before we can get on a plane in order to prevent a hijacking? The privacy versus security debate also applies to how we... Read More

Chinese attacks like the one against Google are on pace to double this year
Recent Internet attacks from China against Google and other U.S. companies will more than double this year if the pace during the first two months continues, a security expert says at RSA Conference. Read More

Former NSA tech chief: I don't trust the cloud
The former National Security Agency technical director told the RSA Conference he doesn't trust cloud services and bluntly admonished vendors for leaving software vulnerabilities unpatched sometimes for years. Read More


E-BOOK: Sybase

5 Key Mobile Management Must-Dos
Discover the five steps you can take to realize comprehensive management of your mobile environment. This IDG Playbook will guide your strategy for managing and securing your booming mobile environment, regardless of the variety of hardware and operating systems. Read More Now

Check Point puts VPN in USB stick
Check Point has become the latest vendor to push the USB stick as the road warrior's best friend, announcing a way for business travellers to carry around their office desktop on a single drive. Read More

Tracing attack source key to cybersecurity strategy, Chertoff says
Michael Chertoff, former head of the U.S. Department of Homeland Security, talked of the difficulties in creating a national cybersucurity plan during an interview with Computerworld. Read More

Source code management a weak spot in Aurora attacks
Companies should take extra steps to secure their source code from the type of targeted attacks that hit Google, Adobe, Intel and others over the past few months. Read More

Typical Windows user patches every 5 days
The typical home user running Windows faces the "unreasonable" task of patching software an average of every five days, a security and vulnerability research company said. Read More


WHITE PAPER: Force10

Three Steps to Saving with Cloud Computing
Discover how cloud computing dynamically streamlines your infrastructure, delivering freely scalable application service levels; dramatic capital and operational cost savings; flexibility and agility without new hardware; and more. Read Now!

Tweet this: Social network security is risky business
The debate about whether companies should let their workers access social networking sites on the job is about more than corporate productivity; It's about security, too. Read More

Security firms help shut down Mariposa botnet
The cybercriminals behind the Mariposa botnet, which attacked 13 million computers worldwide, stealing sensitive personal data such as social networking logins and credit card details, have been arrested, says Panda Security and Defence Intelligence. Read More

Open Identity Exchange backs U.S. gov't privacy guidelines
Google, Equifax, Verizon and others launched the Open Identity Exchange (OIX) this week to support federal government guidelines for online privacy and security. Read More

RSA extends security tools to VMware
EMC's RSA division is embracing the virtualization trend that its VMware spinoff helped kick off, announcing Thursday that three of its core security products will work in VMware virtualized environments. Read More

CA extends identity management to Salesforce.com apps
CA Identity Manager can now be used to automate processes, such as provisioning and de-provisioning user access, for Salesforce.com's sales forecasting application. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Forrester Research and Network World want to hear from you!
We are collaborating to conduct an on-line-based study focused around data center strategy. The survey should take approximately 12 to 15 minutes to complete. This is both a confidential and anonymous survey and your results will only be used in aggregate. As a special thankyou, all respondents will receive a free copy of the resulting research report from Forrester – a $500 value! Thank you for taking the time to fill out the survey.

Today from the Subnet communities

Massive giveaway from Cisco Subnet: 50 copies of the Cisco Press CCNP Cert Kits kits are up for grabs. Deadline March 31. 15 books on Microsoft PerformancePoint business analytics available, too.

SLIDESHOWS

7 most useful Firefox add-ons
Some "add-on apps" work well enough to replace a standalone desktop application. Here are seven add-ons that transform Firefox into a fully functioning application.

Fave raves: IT pros' favorite products
We asked readers about their favorite must-have network products and found there's a lot of love for products that can automate manual processes, improve visibility and management, and speed performance for end users. Products that save money are also, not surprisingly, big favorites.

MOST-READ STORIES

  1. New exploit technique nullifies major Windows defense
  2. Ten of the world's strangest social networks
  3. The man behind Microsoft's Windows Phone design
  4. Is Novell worth $2 billion?
  5. Wi-Fi finders let thieves track down hidden laptops
  6. 21 apps Apple doesn't want on your 3.0 iPhone
  7. EMC: Flash could spell doom for Fibre Channel
  8. 7 most useful Firefox add-ons
  9. Microsoft: Don't press F1 key in Windows XP
  10. Novell target of hedge fund's $2 billion takeover bid

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment