Tuesday, September 07, 2010

Microsoft investigates two-year-old IE bug

  What security can learn from the $15M Sprint employee breach | How to guide: Cisco ASA SSLVPN using Certificates for 2-factor Auth
 
  Network World Security

Forward this to a Friend >>>


Microsoft investigates two-year-old IE bug
Microsoft is looking into a long-known vulnerability in Internet Explorer (IE) that could be used to access users' data and Web-based accounts. Read More


WEBCAST: Palo Alto Networks

60 Minutes with Security Visionary Nir Zuk
Join Nir Zuk, network security visionary and founder and CTO of Palo Alto Networks, for an interactive online interview with security analyst Mark Bouchard, CISSP. Watch Nir speak about the state of the information security industry. Learn More!

WHITE PAPER: NetGear

Comprehensive Internet Security Employing A Layered Defense
The threat landscape has experienced growth requiring comprehensive security measures via a layered defense strategy to protect against this wide array of threats. Learn more.

What security can learn from the $15M Sprint employee breach
Federal prosecutors this week charged nine former Sprint employees with fraud and aggravated identity theft after learning they had cloned customer cell phone numbers to make $15 million worth of calls. According to the complaint from federal prosecutors, the individuals who have been charged worked at Sprint stores in the Bronx, Bergen, N.J., and Tampa, Fla., and used company computers to get confidential information about thousands of customers. The data was used to create the so-called 'clone' cell phones. Of the $15 million worth of calls, a large percentage of them were international calls, said prosecutors. Read More

How to guide: Cisco ASA SSLVPN using Certificates for 2-factor Auth
I have seen a big shift over the past year towards using digital certificates for 2-factor authentication. Sure tokens are still the market share leader for this function but certificates are gaining due to their inexpensive cost and advancements in ease of management and deployment. The Cisco ASA has supported certificates for a long time now, but it is only this past year that I see mainstream... Read More


DOWNLOAD: BlackBerry

Free Download from RIM
BlackBerry Enterprise Server Express offers IT control and security features you can trust even for employees that choose to bring their own BlackBerry smartphones into your business. Download this free license to support up to 75 users on your existing Exchange Server. Download Today!

Facial recognition: Identifying faces in a crowd in real-time
Facial recognition systems have been evolving since the 1960s, trying to automatically identify a person from a mug shot, database, video, or digital image. Most were flawed and could be rendered ineffective if a full frontal view of the face was off by 20 degrees, by poor lighting, long hair, sunglasses, and even by a big toothy smile. But now facial recognition as a security system has leapfrogged... Read More

Electric power industry as critical infrastructure
The widespread and increasing use of Supervisory Control and Data Acquisition (SCADA) systems for control of energy systems provides increasing ability to cause serious damage and disruption by cyber means. The exponential growth of information system networks that interconnect the business, administrative, and operational systems contributes to system vulnerability. Read More


WHITE PAPER: Symantec

Don't Leave Your Business at Risk- Protect it Completely
The time is right for a clear assessment of your risks, and a realistic plan to address them—for your customers, your reputation, and your business future. Discover best practices for protecting your business data and the solutions available to start now by reading this guide. Read Now.

Can a Relative or Roommate Spy on Me?
If you're both adults, can someone you're living with spy on your Internet habits? nikkiraz asked the Networking forum. Read More

Security program automatically tracks down missing patches
Secunia has updated its Personal Software Inspector (PSI) with the ability to silently download and apply patches from multiple vendors soon after their release. PSI 2.0 is now available in an open beta test, Read More

Virtualize your browser to prevent drive-by malware attacks
Does Web browsing make you fearful of picking up a virus or downloading malware? It won't if you do your browsing in a virtualized environment on your desktop. Invincea Browser Protection uses virtualization technology to separate untrusted content coming from the Web from the rest of your desktop and network. Read More

Consumer group lampoons Google CEO over privacy issues
Consumer Watchdog, a group that has been a sharp critic of Google's privacy practices in the past, is at it once again. Read More

 
 
 

Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

SLIDESHOWS

Are you the corporate geezer?
Our first Geezer Quiz in 2009 has been so popular that we've created this new set of questions that will test your memory and perhaps also bring on a wave of nostalgia for the days of minicomputers, X.25 and token ring. Keep score and see how well you do at the end. Enjoy!

The hottest virtualization products at VMworld
With VMworld kicking off in San Francisco, this is one of the biggest weeks of the year in the virtualization industry. VMware, Citrix, EMC and many other companies are releasing new virtualization technologies or adding virtualization capabilities to existing products. Here's a roundup of what's being announced this week.

MOST-READ STORIES

  1. The most dangerous jobs in technology
  2. Burning Man's open source cell phone system could save the world
  3. Only 5 (all women) of 135 pass Defcon social engineering test
  4. Fake antivirus software using ransom threats
  5. Cisco buys wireless smart grid company
  6. Linux: A double-edged sword for open source
  7. 6 useful Wi-Fi tools for Windows
  8. Windows is still relevant in the virtualization era
  9. Virtualize your browser to prevent drive-by malware attacks
  10. Dell loses 3PAR bidding war to HP
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment