Search This Blog

Friday, July 30, 2010

'Unhackable' Android can be hacked

Microsoft's bug reports fail to produce prompt patches | US military wants to protect social media privacy

Network World Security

Forward this to a Friend >>>


'Unhackable' Android can be hacked
LAS VEGAS -- Once thought to be unhackable, the Android phone is anything but, according to researchers presenting at Black Hat 2010. Read More


WHITE PAPER: Insight

How to Double Productivity of Your IT Staff
Examine how Oracle Database 11g helps IT provide more information with higher quality of service, making more efficient use of budgets and reducing the risk of change in data centers. Learn more!

WHITE PAPER: EMC

Embark on the VDI Journey
Deploying a Virtual Desktop Infrastructure (VDI) moves resources back into the data center making them easier to manage and improving efficiency. The increased standardization and reductions in the number of desktop images simplifies image building, patch testing, and update testing. Click to Continue

Microsoft's bug reports fail to produce prompt patches
The Microsoft Vulnerability Research program said Wednesday that third party developers have patched less than half the bugs it reported to them over the past 12 months. Read More

US military wants to protect social media privacy
Military researchers are embarking on a project designed to provide social media users on Facebook or even Google for that matter, greater privacy. Read More

ATM hack gives cash on demand
Barnaby Jack hit the jackpot at Black Hat on Wednesday. Twice. Read More

FBI details worst social networking cyber crime problems
The FBI has in the past two years seen a major uptick in the use social networking accounts such as Facebook and MySpace for cyber crime and today it detailed that problem to the House Judiciary Subcommittee on Crime, Terrorism, and Homeland Security. Read More


WHITE PAPER: Insight

How to Double Productivity of Your IT Staff
Examine how Oracle Database 11g helps IT provide more information with higher quality of service, making more efficient use of budgets and reducing the risk of change in data centers. Learn more!

X Prize opens $1.4M competition for technology to rapidly clean up oil spills
As expected, X Prize Foundation today announced a $1.4 Million competition for advanced technology to help clean up devastating oil spills like the one currently Read More

Microsoft wins a Pwnie for failure
Microsoft has earned the dubious distinction of having the Most Epic FAIL of the last year in computer security with a browser cross-site scripting (XSS) filter that actually exacerbated the problem.The company was given the award at the conclusion of the annual Blackhat 2010 security conference Wednesday in Las Vegas. I wasn't there so I don't know if anyone from Microsoft stepped up to accept... Read More

Open source web apps often insecure, new tool discovers
Security company Qualys has released a new open source tool, BlindElephant, which can accurately fingerprint web applications down to version level in order to better manage the security issues which now plague such software. Read More

Details from 100 million Facebook profiles posted online
Details from 100 million Facebook profiles have been made available on the web by a security consultant. Read More


WHITE PAPER: Qualys

12-point checklist outlines key considerations
Discover a 12-point checklist for choosing the best vulnerability management solution for your organization. Read now!

Google crowned 'king of malware'
Google has been crowned the 'king of malware' by security company Barracuda Networks, linking to twice as much malware as search rivals Bing, Yahoo and Twitter combined. Read More

Juniper secures Cisco Cius OS
Juniper can now secure Cisco's new Cius tablet thanks to an acquisition it made this week. Cisco's rival announced plans to acquire SMobile, a developer of security software for tablets and smartphones, for $70 million. Read More

Verizon: Data breaches often caused by configuration errors
Hackers appear to be increasingly counting on configuration problems and programming errors rather than software vulnerabilities in order to steal information from computer systems, according to a new study from Verizon. Read More

Black Hat too commercial for you?
Two premiere security conferences -- Black Hat and DefCon -- run back-to-back in Las Vegas this week, each with their own distinct flavor. But even these events don't meet the needs of all computer security pros, setting the stage for a widening set of satellite events. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

SLIDESHOWS

Mobile deathmatch: Apple iOS 4 vs. Android 2.2
Apple's iOS has been wowing users for four years in the iPhone and now the iPad. Available in smartphones and now tablets from various vendors going on two years, Google's Android has proven itself to be a strong contender that has the only real chance to surpass iOS.

15 summer vacation ideas for geeks
From Star Trek and Space Camp to baseball minutiae, vintage video games, anime, pirates, Harry Potter and They Might Be Giants, there's a vacation option for any type of geek this summer.

MOST-READ STORIES

  1. Apple grants ABC access to its secretive "black labs"
  2. WPA2 vulnerability found
  3. Cisco study warns against "FarmVille"
  4. Is Sprint losing its WiMAX/4G gamble?
  5. MIT design could speed up the Internet
  6. Certified lies: Big Brother in your browser
  7. Avaya stares down Microsoft, Cisco
  8. Black Hat too commercial for you?
  9. Mobile deathmatch: Apple iOS 4 vs. Android 2.2
  10. Should you even bother looking at Windows Phone 7?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: