Tuesday, July 20, 2010

Security Secrets the Bad Guys Don't Want You to Know

  Black Hat talk to reveal analysis of hacker fingerprints | Will Cyber Espionage Attacks Trigger NSA's Perfect Citizen?
 
  Network World Security

Forward this to a Friend >>>


Security Secrets the Bad Guys Don't Want You to Know
You already know the basics of internet security, right? Read More


RESOURCE COMPLIMENTS OF: Palo Alto Networks

60 Minutes w/ Security Visionary Nir Zuk
Join Nir Zuk, network security visionary and founder of Palo Alto Networks, for a live video interview. Nir was one of the developers of stateful inspection firewall technology, worked on the world's first IPS appliance and is now pioneering next-gen firewalls. Watch Nir speak about the state of info security industry and pose your questions to him.

WHITE PAPER: Qualys

12-point checklist outlines key considerations
Discover a 12-point checklist for choosing the best vulnerability management solution for your organization. Read now!

Black Hat talk to reveal analysis of hacker fingerprints
Looking deeper within malware yields fingerprints of the hackers who write the code, and that could result in signatures that have a longer lifetime than current intrusion-detection schemes, says one Black Hat 2010 speaker. Read More

Will Cyber Espionage Attacks Trigger NSA's Perfect Citizen?
There is a new vicious rootkit-level malware infection targeting critical infrastructure and aimed at corporate or government espionage. It often enters the enterprise through USB sticks. Read More

No iPhone bumpers here, NASA revamps historic 9 million lb Mars antenna
The ubiquitous antenna was all the buzz last week as Apple tried to squelch the latest glitch in its popular iPhone. But those a Read More


WHITE PAPER: MessageLabs

The Wild, Wild Web: How to Ensure 360-Degree Border Security
Managing the security and availability of Web, email, and IM is complex. This paper will discuss the modern threat of blended attacks from web, email and IM. and highlight how a comprehensive hosted solution by Symantec Hosted Services can secure your networks from these threat vectors. Read Now

Dell offering free Web browser security tool
Dell, through its Kace unit, is making available free Web browser security software that works by creating a protective "sandbox" on the desktop to isolate the user's desktop from malware or other harmful actions that might be encountered browsing the Web. Read More

Windows 'shortcut' attack code goes public
A security researcher on Sunday published a working exploit of a critical Windows vulnerability, making it more likely that attacks will spread. Read More

Microsoft confirms 'nasty' Windows zero-day bug
Microsoft is warning that attackers are exploiting a critical unpatched Windows vulnerability using infected USB flash drives. Read More


WHITE PAPER: MessageLabs

Top Ten Web Threats and how to eliminat
This paper raises real challenges for IT managers who have to protect the business against malware, keep internet bandwidth available for legitimate business needs and enforce acceptable use policies for the human resource department. Read Now.

Colorado warns of major corporate ID theft scam
Colorado officials are warning the state's 800,000 or so registered businesses to watch out for scammers who've been forging business identities to make fraudulent purchases from several big-box retailers. Read More

Researchers: Authentication crack could affect millions
Due to a reporting error, the story, "Researchers: Authentication crack could affect millions," posted Thursday, incorrectly described the target of an attack on Internet authentication systems. The attack targets digital signatures used by authentication tokens sent by the browser to prove that the user is logged into the Web site. Read More

Cloud security strategies: Where does IDS fit in?
Security practitioners diving into cloud computing must make older security tools like IDS work in this new world. In a CSO podcast last week, Stu Wilson, CTO of IDS provider Endace, sought to explain how this older technology is still relevant in enterprise cloud security strategies. Read More

Cisco among Winners of National Cybersecurity Awareness Challenge
Secretary Napolitano announced the winners of DHS' National Cybersecurity Awareness Challenge July 14th. This contest called on companies to develop creative ways to enhance awareness of the importance of cybersecurity with the goal of safeguarding America's computer systems and networks from attacks. The contest, kicked off last march, received over 80 proposals from both public and private... Read More

United Nations Making Slow Progress on Cybersecurity
Good news: Lsst Friday, 15 countries including the United States, Russia, and China agreed upon a set of recommendations to the United Nations secretary general that will serve as the basis for negotiating an International computer security treaty. Bad news: Getting this far took far too long. While diplomats wraggled over wording and process, the state of cybersecurity severely degraded. ... Read More

 
 
 

Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

SLIDESHOWS

Robocop ran DOS
Virtually no sci-fi or action flick these days is complete without a computer scene showing a few screens of mysterious scrolling text and a 3D wire-frame model. But where does this vaguely tech-looking stuff come from? Well, more often than not, it comes from a Website, app, or startup screen from the real world at the time the movie was made. Read on for some of the most unexpected tech cameos in movies.

Top Russian spy ring technology screw-ups
Alleged Russian spies arrested last month in cities around the United States seemed to be lacking in spycraft and in urgent need of some IT expertise, based on some of the gaffes they made. They also used some technologies effectively. Here is a summary of their efforts as revealed in court filings against them.

MOST-READ STORIES

  1. Droid X vs. Droid
  2. Robocop ran DOS
  3. Air Force streamlines cybersecurity hiring for 680 open positions
  4. Cisco at a crossroads?
  5. The underappreciated antenna
  6. 15 summer vacation ideas for geeks
  7. Quest acquisition is strong IAM move
  8. Strangest Sights in Google Earth
  9. Cisco tops in IPS: survey
  10. Apple to give iPhone 4 users free cases

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment