Search This Blog

Friday, July 23, 2010

Microsoft: No money for bugs

  Google calls, raises Mozilla's bug bounty for Chrome flaws | Feds charge couple in $40M theft of GM hybrid car tech for Chinese company
 
  Network World Security

Forward this to a Friend >>>


Microsoft: No money for bugs
Microsoft will not follow the lead of Mozilla and Google in paying researchers for reporting vulnerabilities, a company executive said today. Read More


VIDEO: Intel

Security: Everyone's Challenge
Making security everybody's job is tougher than ever. You told us so, in a recent quick poll. The top concern: "Making my colleagues aware that security is now everyone's job:" 48%—nearly double the other concerns. But Intel technology is making life a little easier for tech executives. Click here to see how.

WHITE PAPER: Qualys

12-point checklist outlines key considerations
Discover a 12-point checklist for choosing the best vulnerability management solution for your organization. Read now!

Google calls, raises Mozilla's bug bounty for Chrome flaws
Google this week hiked bounty payments for Chrome bugs to a maximum of $3,133, up almost $2,000 from the previous top dollar payout of $1,337. Read More

Feds charge couple in $40M theft of GM hybrid car tech for Chinese company
An FBI investigation has lead a Michigan couple to be charged with stealing hybrid car information from GM to use in a Chinese auto outfit. Read More

Dell Warns of Malicious Code on Server Motherboards
A recent Network World article stated that Dell is warning customers that a small number of PowerEdge server motherboards sent out through service dispatches may contain malware. Here is a link to the article in question: http://www.networkworld.com/news/2010/072110-dell-warns-of-malware-on.html?hpg1=bn Dell is doing the right thing by alerting potentially impacted customers but questions... Read More

Inside IBM's game changing mainframe moments
With the announcement of a new generation of IBM mainframes today, the zEnterprise, Big Blue has continued to change, improve and evolve one of the most enduring hunks of metal and electronics in the history of computing. There have been many key points in the evolution of the mainframe, here we take a look at a few of the bigger changes. Read More


WHITE PAPER: Red Hat

Detailed Planning Guide: SAP to Red Hat Migration
Lower costs and improve performance migrating SAP to Red Hat Enterprise Linux. Download this guide today and discover how you can perform a basic installation and migration in less than 1 day. Examine pre- and post-migration considerations and other upfront planning topics to help avoid potential problems. Read more

New 'Kraken' GSM-cracking software is released
The (Global System for Mobile Communications) technology used by the majority of the world's mobile phones will get some scrutiny at next week's Black Hat security conference, and what the security researchers there have to say isn't pretty. Read More

Apple in trouble over spam filtering
"More than 80 percent of email is spam, which is why companies use InNova's invention rather than forcing employees to wade through billions of useless emails," said patent-infringement attorney Christopher Banys in a press release. Read More

Design that ensures security, also emphasizes style
Can security, often seen as obvious and ugly, actually be stylish and suitable for a building? Architect Rick Reeder gives us a tour of a property he designed with artful security as the goal Read More

Corporate ID theft hits Georgia businesses
Just days after Colorado officials warned businesses about scammers who are forging corporate identities to commit financial fraud, an official in Georgia said the same has been happening in that state as well. Read More


E-GUIDE: Force10 Networks Inc.

Examining Nuances of the Cloud
Choosing the best cloud strategy means understanding the promises and pitfalls of each approach. This Network World eGuide provides expert articles on the nuances between different cloud strategies, best practices on building a hybrid cloud and making sure you have an exit strategy in case the cloud does not work out. Read More Now

Fake femme fatale shows social network risks
Social networking pages featuring the profile of a fake Navy cyberthreat analyst attracted some 300 friends in the intelligence, military and security communities in an experiment conducted by a security researcher. Read More

Security Claim: Most Home Routers Vulnerable to Hack
An engineer from security firm Seismic claims he will soon release instructions on how to hack millions of wireless routers commonly used in residential Internet connections. The how-to hack instructions are part of what has become an annual chest-beating by speakers at the Black Hat security conference that hype their keynotes with end-of-PC-security-as-we-know-it promises. Read More

Thoughts on Protection from Hardware-based Malware
Well this is disturbing. Apparently Dell shipped several models of their PowerEdge line of servers with Trojans built into the actual hardware of the server (well, the firmware I suppose). Dell is issuing fixes for this particular problem, but this really highlights the growing risk and sophistication of malware developers. Read More

Nearly 13 Million Have Been Hit With Identity Theft
Nearly 13 million people have suffered from identity theft so far this year. That's ridiculous! Lax security threatens to hammer a nail in the coffin for privacy. Read More

 
 
 

Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

SLIDESHOWS

Say what?
Earlier this month, Microsoft's chief operating officer made a statement that sent everyone's jaws a-dropping. "It looks like the iPhone 4 might be their Vista, and I'm OK with that," he said during a keynote speech at the company's annual partner conference. It got me thinking about quotes that have and will go down in history from the industry's most famous executives. Can you guess who made the following statements?

15 summer vacation ideas for geeks
From Star Trek and Space Camp to baseball minutiae, vintage video games, anime, pirates, Harry Potter and They Might Be Giants, there's a vacation option for any type of geek this summer.

MOST-READ STORIES

  1. Fake femme fatale shows social network risks
  2. Is open source Snort dead? Depends who you ask
  3. Dell warns of malware on server motherboards
  4. Is ubiquitous encryption technology on the horizon?
  5. Firefox lets hackers grab your passwords
  6. USB 3.0: Five Things You Need to Know
  7. Defcon social engineering contest stirs concerns
  8. Say what?
  9. Nearly 13 Million Have Been Hit With Identity Theft
  10. Is Windows Phone 7 really a "disaster"?

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: