Thursday, July 29, 2010

ATM hack gives cash on demand

Wi-Fi WPA2 vulnerability FAQ | Despite adding customers, Sprint still on shaky ground

Network World Daily News AM

Forward this to a Friend >>>


ATM hack gives cash on demand
Barnaby Jack hit the jackpot at Black Hat on Wednesday. Twice. Exploiting bugs in two different ATM machines, the researcher from IOActive was able to get them to spit out money on demand and record sensitive data from the cards of people who used them. Read More


VIDEO: Intel

The Anxiety Behind Security and Compliance
What keeps IT executives up at night? Two words: security and compliance, according to a recent quick poll. Remote access is a solid productivity provider, but it can be a bear to manage. Learn where data loss, patch management and help desk anxieties placed among IT concerns. Click Here

WHITE PAPER: Riverbed

Address Real-Time Application Performance
IDC interviewed customers using Riverbed Cascade solution. Their analysis includes hard dollar ROI and benefits of the following features: • Application-level view of networks and servers • Visibility into end-to-end application delivery dependencies • Network behavioral analysis • Metrics to track performance SLAs Read now!

Wi-Fi WPA2 vulnerability FAQ
AirTight Networks says it's found a weak point in Wi-Fi Protected Access 2 (WPA2), the mainstay of enterprise Wi-Fi security. But has it? Security expert Matthew Gast says the attack seems to be a familiar ARP spoofing exploit that works as well on wired as wireless LANS. If so, it can easily be contained. Read More

Despite adding customers, Sprint still on shaky ground
Sprint's latest customer increases still don't show the company operating from a position of strength. If Sprint wants to get strong, reliable sources of revenue, it's going to have to start growing its postpaid customer base. Read More

Amazon CTO counters skepticism on cloud security
Amazon's cloud computing division is planning to "raise the bar" on security, and claims it can provide better security than most enterprises achieve on their own. Read More

5 ways to use ebootable Linux live discs
Five ways to use ebootable Linux live discs, with screenshots. Read More


WEBCAST: Accelops

Why Private Clouds May Prevail
Cloud computing's perceived challenges of security, visibility and management may give the upper hand to private clouds. Join Yankee Group for this Webcast that discusses how to ensure you deploy a cloud that meets your organization's security and compliance needs. View Now

This year's Defcon badge has a persistent display
It's one of the best things about the Defcon hacking conference, and one of its most closely guarded secrets: the programmable badge that's handed out to show attendees every year. Read More

China's tech policies may lead to trade disputes, report warns
China's goal to become a technology giant is being helped by government policies that may force businesses to transfer their technical know-how for access to China's market, a new report finds. Read More

DHS exec takes hard questions on cybersecurity
The U.S. Department of Homeland Security sent its highest-ranking official ever to speak at the Black Hat conference this week, and its Deputy Secretary Jane Holl Lute ended up fielding a few tough questions from skeptical computer security professionals in attendance. Read More

Massive check-fraud botnet operation tied to Russia
Check fraud is an old-fashioned kind of crime, but a criminal ring with ties to Russia is using modern cybercrime techniques, including botnets, online databases of financial information and check imaging archives, to run a highly automated, multi-million-dollar counterfeit-check operation. Read More


REPORT: Radiant Logic, Inc

Download Latest Gartner Report on IdM
Today's centralized identity infrastructure can't keep up with tomorrow's increasingly federated demands, from user-centric identity, to Identity-as-a-Service, and the cloud. In "The Emerging Architecture of Identity Management," Gartner outlines a vision for tomorrow's identity landscape--one with virtualization at its core. Download the report--free!

Cisco, VMware, NetApp claim first end-to-end FCoE configuration
Cisco, NetApp and VMware said they have certified their products to create a single, end-to-end Fibre Channel over Ethernet network that can handle virtual server traffic as well as high-speed data storage transport. Read More

Could Facebook be the next AOL?
A new pack of open source tools aims to commoditize the social networking experience. Read More

What's in a License?
Most people never take the time to read an End User Licensing Agreement (EULA) when installing or updating their software. For example, here is a link to the Microsoft Vista EULA that you probably skipped right over and a great article on how the EULA prevents people from using their purchased Windows operating system the way they wish. Read More

New Zealand pizza lovers suffer information theft from Hell
Some 230,000 New Zealanders have been told that their personally identifiable information may have fallen into the hands of hackers who apparently compromised the network of a locally famous food chain, Hell Pizza. Read More

3D camcorders could boost 3D TV adoption
3D just got a bit more interesting, now that some companies have announced camcorders capable of shooting video in 3D. In addition to Panasonic's high-profile announcements, DXG USA announced a 3D pocket camcorder and 7-inch 3D Media Player display that won't require special glasses. (A special bundle is being pre-sold at Hammacher-Schlemmer's Web site for $600) Read More

NASA identifies Top Ten space junk missions
While the recently released US National Space Policy has given NASA and the Defense Dept., new impetus to work toward removing space debris, the space agency this month outlined the top 10 reasons so much junk is out there in the first place. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

SLIDESHOWS

Mobile deathmatch: Apple iOS 4 vs. Android 2.2
Apple's iOS has been wowing users for four years in the iPhone and now the iPad. Available in smartphones and now tablets from various vendors going on two years, Google's Android has proven itself to be a strong contender that has the only real chance to surpass iOS.

15 summer vacation ideas for geeks
From Star Trek and Space Camp to baseball minutiae, vintage video games, anime, pirates, Harry Potter and They Might Be Giants, there's a vacation option for any type of geek this summer.

MOST-READ STORIES

  1. Apple grants ABC access to its secretive "black labs"
  2. WPA2 vulnerability found
  3. Cisco study warns against "FarmVille"
  4. Is Sprint losing its WiMAX/4G gamble?
  5. MIT design could speed up the Internet
  6. Certified lies: Big Brother in your browser
  7. Avaya stares down Microsoft, Cisco
  8. Black Hat too commercial for you?
  9. Mobile deathmatch: Apple iOS 4 vs. Android 2.2
  10. Should you even bother looking at Windows Phone 7?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment