Search This Blog

Thursday, July 29, 2010

Cisco responds to Black Hat's Million Router Hacker

  Nearly half of Microsoft's 2010 security patches have known problems | Apple patches Safari ahead of Black Hat talk, launches add-on gallery
 
  Network World Security

Forward this to a Friend >>>


Cisco responds to Black Hat's Million Router Hacker
Cisco has posted a blog entry in response to the talk being delivered this week at Black Hat on hacking millions of consumer routers. We blogged on this talk two weeks ago. Read More


WHITE PAPER: Cisco

Security in the Cloud
This technology dossier contains four papers that address security considerations in cloud computing. It includes IDG Research results on what IT managers have to say about cloud security, executive viewpoints on blending cloud solutions to optimize security, and a strategy paper that addresses protecting data. Read now!

REPORT: Radiant Logic, Inc

Download Latest Gartner Report on IdM
Today's centralized identity infrastructure can't keep up with tomorrow's increasingly federated demands, from user-centric identity, to Identity-as-a-Service, and the cloud. In "The Emerging Architecture of Identity Management," Gartner outlines a vision for tomorrow's identity landscape--one with virtualization at its core. Download the report--free!

Nearly half of Microsoft's 2010 security patches have known problems
Last month's fix of a broken Windows Server patch got me thinking -- just how often does Microsoft release a patch that it knows has problems? The answer: nearly half the time. How often are those problems so severe they fry your system? That's less clear, but it seems as if the answer is, "not all that often." Read More

Apple patches Safari ahead of Black Hat talk, launches add-on gallery
Barely 24 hours before a researcher was set to dive deeper into a Safari bug at the Black Hat security conference, Apple today fixed that flaw and 14 others. Read More

900M financial records compromised in just six years
Ms Smith: According to the 2010 Verizon Data Breach Investigations Report (DBIR), data breaches declined in 2009. But that's not saying much. Over six years the report covers 900+ breaches involving more than 900M compromised records. Read More

New Zealand pizza lovers suffer information theft from Hell
Some 230,000 New Zealanders have been told that their personally identifiable information may have fallen into the hands of hackers who apparently compromised the network of a locally famous food chain, Hell Pizza. From a story in The New Zealand Herald: Read More


WHITE PAPER: Tripwire

Cyberwar Threats: New Security Strategies for Governments
Threats posed by cyberwar cannot be defended using the traditional all-or-nothing security that's aimed solely at keeping attackers out of the government enterprise. Learn why Tripwire's solutions provide the real-time awareness necessary to fight cyberwar. Read More!

The Next Big Privacy Concern: RFID "Spychips"
Read More

NASA identifies Top Ten space junk missions
While the recently released US National Space Policy has given NASA and the Defense Dept., new impetus to work toward removing space debris, the space agency this month outlined the top 10 reasons so much junk is out there in the first place. Read More

Peer-to-Peer Security
Traditional security solutions are sort of like client/server computing. Security vendors take the role of the server, hosting the master software, adding new anti-malware signatures, and distributing them to all of the clients. This model was adequate in the past but it is no longer good enough. Why? Malware volume stresses the system and all too common zero-day attacks have free and clear access... Read More

This year's Defcon badge has a persistent display
It's one of the best things about the Defcon hacking conference, and one of its most closely guarded secrets: the programmable badge that's handed out to show attendees every year. Read More


WHITE PAPER: Qualys

12-point checklist outlines key considerations
Discover a 12-point checklist for choosing the best vulnerability management solution for your organization. Read now!

Google patches Chrome, sidesteps Windows kernel bug
Google this week issued patches for five vulnerabilities in the Chrome browser, including three rated 'high.' Read More

Massive check-fraud botnet operation tied to Russia
Check fraud is an old-fashioned kind of crime, but a criminal ring with ties to Russia is using modern cybercrime techniques, including botnets, online databases of financial information and check imaging archives, to run a highly automated, multi-million-dollar counterfeit-check operation. Read More

Alleged Mariposa botnet hacker arrested in Slovenia
Slovenian police will hold a press conference on Friday to discuss the arrest of three men in connection the massive Mariposa botnet that was disabled late last year. Read More

DHS exec takes hard questions on cybersecurity
The U.S. Department of Homeland Security sent its highest-ranking official ever to speak at the Black Hat conference this week, and its Deputy Secretary Jane Holl Lute ended up fielding a few tough questions from skeptical computer security professionals in attendance. Read More

Security suites: big protection, little fuss
Just a few short years ago, all a PC needed for protection was a basic antivirus program to guard against any malware that arrived via an e-mail attachment, embedded in a shareware application or piggy-backed on a floppy disk. Read More

Adobe joins Microsoft's patch-reporting program
Adobe and Microsoft are now working together to give security companies a direct line into their bug-fixing efforts. Read More

 
 
 

Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

SLIDESHOWS

Mobile deathmatch: Apple iOS 4 vs. Android 2.2
Apple's iOS has been wowing users for four years in the iPhone and now the iPad. Available in smartphones and now tablets from various vendors going on two years, Google's Android has proven itself to be a strong contender that has the only real chance to surpass iOS.

15 summer vacation ideas for geeks
From Star Trek and Space Camp to baseball minutiae, vintage video games, anime, pirates, Harry Potter and They Might Be Giants, there's a vacation option for any type of geek this summer.

MOST-READ STORIES

  1. Apple grants ABC access to its secretive "black labs"
  2. WPA2 vulnerability found
  3. Cisco study warns against "FarmVille"
  4. Is Sprint losing its WiMAX/4G gamble?
  5. MIT design could speed up the Internet
  6. Certified lies: Big Brother in your browser
  7. Avaya stares down Microsoft, Cisco
  8. Black Hat too commercial for you?
  9. Mobile deathmatch: Apple iOS 4 vs. Android 2.2
  10. Should you even bother looking at Windows Phone 7?

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: