Monday, August 02, 2010

Black Hat gets its video feed hacked

  Best practices for cleaning up your firewall rule base | U.S. should seek world cooperation on cyber conflict, says ex-CIA director
 
  Network World Security

Forward this to a Friend >>>


Black Hat gets its video feed hacked
A security expert found a way to catch the talks at Black Hat for free, thanks to bugs in the video streaming service used by the security conference. Read More


WHITE PAPER: Cisco

Security in the Cloud
This technology dossier contains four papers that address security considerations in cloud computing. It includes IDG Research results on what IT managers have to say about cloud security, executive viewpoints on blending cloud solutions to optimize security, and a strategy paper that addresses protecting data. Read now!

WHITE PAPER: Tripwire

Cyberwar Threats: New Security Strategies for Governments
Threats posed by cyberwar cannot be defended using the traditional all-or-nothing security that's aimed solely at keeping attackers out of the government enterprise. Learn why Tripwire's solutions provide the real-time awareness necessary to fight cyberwar. Read More!

Best practices for cleaning up your firewall rule base
After years of use, the rule bases that drive your network firewalls get unwieldy -- clogged with expired, obsolete, duplicative and conflicting policies. For better performance, stronger security and compliance with regulations, you'll want to clean up those rule bases. In this article, technical experts and customers of Tufin Technologies, a firewall management provider, offer their best practices for cleaning your firewall rule base, either manually or with tools that automate the process. Read More

U.S. should seek world cooperation on cyber conflict, says ex-CIA director
The U.S. needs to consider working with other leading nations to develop rules of engagement in cyberspace, retired general and former director of the CIA Michael Hayden said during a keynote address at the Black Hat conference here on Thursday. Read More

US military wants to protect social media privacy
Military researchers are embarking on a project designed to provide social media users on Facebook or even Google for that matter, greater privacy. Read More


WHITE PAPER: MessageLabs

The Wild, Wild Web: How to Ensure 360-Degree Border Security
Managing the security and availability of Web, email, and IM is complex. This paper will discuss the modern threat of blended attacks from web, email and IM. and highlight how a comprehensive hosted solution by Symantec Hosted Services can secure your networks from these threat vectors. Read Now

Facebook, nannying, and objectives
Gibbs ponders the problems with employees and social networking and suggests that nannying won't cut it. Read More

Researchers tout glass invisibility cloak
Using magnetic resonance technology and glass material, a team of researchers Michigan Tech and Penn State says they can create a cloak that will make objects invisible to human eyes. Read More

Dell's Security Opportunity
This week, Dell announced its entry into the SMB security market with a portfolio of products and services. The initial portfolio is fairly simple, with Dell partnering with others for endpoint security, network security, and security services. Read More


WHITE PAPER: MessageLabs

Employee Web Use and Misuse:
This white paper examines a Web security solution that gives companies the ability to monitor and enforce their Internet usage policies, bringing site monitoring and URL filtering together while insuring security with anti-virus and anti-spyware protection. Read Now

FBI rings organizers over Defcon contest
A Defcon contest that invites contestants to trick employees at U.S. corporations into revealing not-so-sensitive data has rattled some nerves. Read More

AirTight defends Wi-Fi WPA2 'vulnerability' claim
AirTight is defending its claim to have uncovered a vulnerability in the 802.11 specification, and to have mounted an undetectable insider attack based on it. Some have dismissed it as a "publicity stunt." Read More

Bad guys could read RFID passports at 217 feet, maybe a lot more
LAS VEGAS -- Radio frequency ID tags embedded in U.S. passports can be read hundreds of feet away, potentially making it inexpensive and easy to pick American tourists out of crowds for illicit purposes, "spychips", a demonstration at Black Hat 2010 showed. Read More

Real, Usable Access to SharePoint from Mobile Phones
Apparently Microsoft Windows Phone 7 is going to support SharePoint natively. In other words, no more hokey web interface access to a product that is already a bit of a pain to navigate. Read More

 
 
 

Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

SLIDESHOWS

Mobile deathmatch: Apple iOS 4 vs. Android 2.2
Apple's iOS has been wowing users for four years in the iPhone and now the iPad. Available in smartphones and now tablets from various vendors going on two years, Google's Android has proven itself to be a strong contender that has the only real chance to surpass iOS.

15 summer vacation ideas for geeks
From Star Trek and Space Camp to baseball minutiae, vintage video games, anime, pirates, Harry Potter and They Might Be Giants, there's a vacation option for any type of geek this summer.

MOST-READ STORIES

  1. 'Unhackable' Android phone can be hacked
  2. ATM hack gives cash on demand
  3. Black Hat gets its video feed hacked
  4. Happy SysAdmin Day (despite the pay)
  5. FBI rings organizers over Defcon contest
  6. WPA2 vulnerability found
  7. Microsoft's 2010 software 'most complicated lock-in decision in years'
  8. Microsoft: Gmail like a Jaguar with 'vinyl seats'
  9. Bad guys could read RFID passports at 217 feet, maybe more
  10. New Zealand pizza lovers suffer information theft from Hell

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment