Friday, August 06, 2010

Cisco firewalls hit again by DoS condition

  How Microsoft ranks with the most tardy bug fixers | Amazing telescopes produce hot space images
 
  Network World Security

Forward this to a Friend >>>


Cisco firewalls hit again by DoS condition
Cisco is reporting "multiple vulnerabilities" in the firewall services module for its Catalyst 6500 switch and 7600 series router. Cisco issued a security advisory on the vulnerabilities here. The glitches may cause the firewall module to reload after processing crafted SunRPC or certain TCP packets. Repeated exploitation could result in a sustained Denial of Service condition, the Cisco advisory states.... Read More


WHITE PAPER: HP

ROI of Switched Ethernet Networking Solutions
IDC interviewed several organizations to determine their future networking strategies. Learn how they built a foundation to meet network switch demands with an average 5.7 month payback and zero annual maintenance fees. Read Now

WHITE PAPER: Citrix

EMA Report: Customer Satisfaction with ADC Vendors
Enterprise Management Associates report – "Customer Satisfaction with Application Delivery Controller Vendors" -- shows how Citrix NetScaler beats F5 and Cisco in customer satisfaction! Discover why Citrix is superior in 16 out of 21 categories and tops the competition in Presales, Tech Support, Product, Technology and Overall Business Value. Read now!

How Microsoft ranks with the most tardy bug fixers
When HP's Tipping Point issued an ultimatum today to software vendors to fix and reveal to the public software vulnerabilities within six months, Aaron Portnoy, manager of security research at Tipping Point, directed me to a page on the company's Zero Day Initiative (ZDI) site that lists all the vulnerabilities known to ZDI and to the software vendors but for which a patch hasn't yet been developed;... Read More

Amazing telescopes produce hot space images
They may not have the sexiness of their space-born brethren but the world's ground based telescopes routinely pump out some of the world's most important space observations and discoveries. Recently there has been a ton of new discoveries and great images from ground-based telescopes across the world. Read More

Wall Street wants these tech skills
Financial services firms are recruiting more IT professionals this summer than a year ago, and they are looking for strong programming, database and operating system skills to keep their real-time banking and trading systems up and running. Read More


WHITE PAPER: Tripwire

Cyberwar Threats: New Security Strategies for Governments
Threats posed by cyberwar cannot be defended using the traditional all-or-nothing security that's aimed solely at keeping attackers out of the government enterprise. Learn why Tripwire's solutions provide the real-time awareness necessary to fight cyberwar. Read More!

Remains of the Day: There's a hole in my PDF
A security hole that is. Also, the government block one publication's attempt to find out about an Apple antitrust case--so of course it must be going on! And the European Commission's got a new smartphone dans la maison. The remainders for Wednesday, August 4, 2010 are ready to go. Read More

Indonesia presses RIM over its BlackBerry service
Indonesia is continuing to press Research In Motion (RIM) to allow monitoring of BlackBerry data for security reasons, a request made last year but renewed as the Canadian company feels similar pressure from other countries. Read More

Fighting today's malware
How bad is it? Worse than you think. Here's what the new breed of malware looks like -- and what you can do to stop it Read More


WHITE PAPER: HP

Is your WAN designed with your applications in mind?
WAN sourcing has been based on the cost of bandwith and availability. The focus is increasing on sourcing WAN solutions that can meet business needs for application performance. Read about Gartner's structured methodology to design a WAN that both performs well and is cost effective. Read Now

Smartphones as credit cards: Possibly dangerous, definitely inevitable
Now that AT&T and Verizon have decided to turn smartphones into credit cards, you may be asking yourself, "Is this really a good idea?" Read More

Patch or we go public, says bug bounty program
The world's biggest bug bounty program today slapped a six-month deadline on vendors, saying it would release some vulnerability information, even if a patch wasn't ready. Read More

Apple to fix iPhone jailbreak vulnerability with update
A flaw in Apple's iOS that allows iPhones, iPods and iPads to be jailbroken via the Safari web browser is to be fixed. An Apple spokesperson said, "We're aware of this reported issue, we have already developed a fix and it will be available to customers in an upcoming software update." Read More

 
 
 

Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

SLIDESHOWS

Nine real iPad alternatives
Even since Apple released its "magical and revolutionary" iPad, other vendors have been scrambling to deliver products that go Apple one better. Here are nine that are expected to hit the stores this year.

Defcon badge is unlike anything you have ever seen
It's unlike any conference badge you've seen before. Sleek, stylish, programmable, and made out of metal. It's the Defcon 18 conference badge. Unveiled at the annual hacker conference in Las Vegas, here's a look at this year's badge.

MOST-READ STORIES

  1. Marketing gone wild: One product helps you stalk, one stalks you
  2. Google Wave washes out
  3. Android 2.2 on Motorola Droid: First impressions of Froyo
  4. Who really sets global cybersecurity standards?
  5. Back to school bargains IT pros will love
  6. Don't mess with Texas: Lessons from IT outsourcing disasters
  7. 5 Windows 7 security features businesses need to know about
  8. Google, Verizon in talks on net neutrality deal?
  9. Nine real iPad alternatives
  10. 10 dream machines almost nobody could afford

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment