Search This Blog

Tuesday, October 05, 2010

BlackBerry backup encryption broken by Russians

How Treasury, AT&T botched billion-dollar network upgrade | Money mule arrests highlight banks' efforts to fight fraud

Network World Security

Forward this to a Friend >>>


BlackBerry backup encryption broken by Russians
A Russian company that specialises in cracking tools claims it has broken the password protection used to secure data backups from BlackBerry smartphones. Read More


RESOURCE COMPLIMENTS OF: Websense

Join SpeakUp – A Web Security Discussion
SpeakUp is a new interactive Security forum with expert opinion and absolutely no product pitches - it's a terrific way to connect with your peers and discover how the latest trends and technologies are affecting your security. This professionally hosted forum allows you to voice your opinion, get answers and influence the debate. Visit www.websense.com/speakup to register today!

WEBCAST: Cisco Ironport Systems

Is Cloud Email Security Right for You?
Many companies are shifting email applications and data into the cloud model—and yet not without concerns about security. To be sure, business-critical data must be protected. In this webcast, Cisco's senior manager for cloud security, Joel McFarland, addresses the concerns and offers strategies to take control of email security. Learn More

How Treasury, AT&T botched billion-dollar network upgrade
Three years ago, the U.S. Treasury Department awarded a billion-dollar network consolidation project to AT&T, which claimed to win the deal due to its superior "transition plan." Read More

Money mule arrests highlight banks' efforts to fight fraud
The indictments unveiled last week against dozens of people who allegedly helped loot millions of dollars from U.S. businesses via online corporate account takeovers highlights the struggle by financial firms to fight fraud. Read More


WHITE PAPER: ArcSight

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center

Eight hot commercial space projects
NASA budget money to help spark commercial space industry Read More

Cisco to Release a Virtual Security Appliance for VMWare
Cisco Nexus 1000v soon to add stateful firewall functionality to its list of virtual service offeringsAs corporations rapidly move to virtualize their datacenters using technology like VMWare, securing those datacenters becomes much harder. Along with virtualizing the servers, corporations are also using virtualized networking/switching technologies. This allows for the Virtual Machine to talk to another virtual machine purely across a virtual network without ever having to touch any physical network... Read More


WEBCAST: Cisco Ironport Systems

Is Cloud Email Security Right for You?
Many companies are shifting email applications and data into the cloud model—and yet not without concerns about security. To be sure, business-critical data must be protected. In this webcast, Cisco's senior manager for cloud security, Joel McFarland, addresses the concerns and offers strategies to take control of email security. Learn More

Why to Celebrate National Cyber Security Awareness Month
It's that time of year again. The weather is turning cooler, football season has begun, Halloween is fast approaching. That can only mean one thing--it's National Cyber Security Awareness Month! Just in case you aren't really sure what the big deal is, or why you should care, here are five recent security threats that highlight why we need an entire month to raise awareness and promote better computer and network security. Read More

Despite recent busts, ZeuS Trojan will be around awhile
Despite high-profile busts in the U.S. , U.K. and Ukraine of cybercriminals using ZeuS malware to steal from online accounts, ZeuS will evolve and remain an effective theft tool for a long time, security experts say. Read More

Is the Security Appliance Going Virtual?
A look at the potential future of the Security Appliance.A few short weeks ago I had the privilege of attending Gestalt ITs Networking Tech Field Day. It became apparent very quickly that the topic of interest to all the vendors was that of Data Center Virtualization. Each vendor that we visited showed off their high end equipment and gave technical presentations on them. You could quickly get a feel for the fact that they all position themselves to take... Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

SLIDESHOWS

Meet RIM's BlackBerry PlayBook
Research in Motions heats up the tablet wars with BlackBerry PlayBook that aims to outshine Apple and Samsung when it comes to business appeal.

A brief history of Android
In this slideshow we'll take you back in time to trace the origins of the Android operating system and show how it rose rapidly to become one of the top operating systems in the mobile world.

MOST-READ STORIES

  1. Despite recent busts, Zeus Trojan will be around for awhile
  2. The 17 most dangerous places on the Web
  3. Cisco to release a virtual security appliance for VMware
  4. Zeus Trojan bust reveals sophisticated 'money mules' operation in U.S.
  5. Buffalo: Data center capital of America?
  6. Verizon blames built-in phone software for overcharges
  7. Windows 7 family pack discount deal returns
  8. Half of VMware customers virtualize Microsoft Exchange
  9. BoA is holding my online bank accounts hostage
  10. Ig Nobel honors world's wackiest researchers: 2010 winners

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: