Friday, October 22, 2010

Technologically clueless Russian spy hired as 'IT innovator' for bank

Two Vulnerabilities Provide Root Access on Linux | FBI fires back at report critical of complex computer project

Network World Security

Forward this to a Friend >>>


Technologically clueless Russian spy hired as 'IT innovator' for bank
Russian spy Anna Chapman is making headlines this week for posing provocatively in a photo spread in the Russian edition of Maxim magazine, but she equally deserves notoriety for landing a job as an IT security official in a Russian bank despite glaring gaps in her technical knowledge. Read More


WEBCAST: Bradford Networks

Step-by-Step Process to Network Security
Hear from one financial services IT pro who thought his network was completely secure until it failed an internal security audit. Tim Childress from the credit card division of Bridgestone discusses the unique approach he took to improve network security. Hear how he met his objectives to stop rogue devices, gain better network visibility. View now

WHITE PAPER: Iron Mountain

The Know-IT-All's Guide
This fun-to-read but informative ebook can help you successfully plan for eDiscovery and ensure your meetings with legal will never be the same. Read Now.

Two Vulnerabilities Provide Root Access on Linux
Two new vulnerabilities affecting Linux were uncovered this week that could potentially be used by malicious hackers to gain root privileges. Read More

FBI fires back at report critical of complex computer project
Dept. of Justice report says FBI Sentinel computer system lacks features, is over budgetLate, over budget and lacking critical components were the three main shots the Department of Justice's Office of the Inspector General (OIG) leveled at the FBI this week in a report on the agency's over-arching computer system revamp known as Sentinel. Read More

Mac users warned of growing virus threat
Attacks on the Mac are now significant enough to warrant Apple users investing in an anti-virus product, security company Panda Security said as it launched a new product that offers such protection. Read More


WHITE PAPER: Quantum Corporation

The Value of iLayer Management: A Technical Brief
Many customers have expressed a desire for tape libraries to proactively report more—and better—information about their units, therefore requiring less hands-on time supporting their tape systems. Read More

How to Stretch VLANs Between Multiple Physical Data Centers - Part 2
There and Back Again With 802.1q, EoMPLS, VPLS and OTVA quick comparison of EoMPLS, VPLS and A-VPLS really reflects the learning curve the network industry has experienced as the technologies are deployed. All three are PW services and use a MPLS infrastructure to build the PWs. EoMPLS is a point to point technology and as such is well suited for point to point applications. Scaling EoMPLS can be a challenge as the number of PWs increments and we begin... Read More

Entertaining risk analysis
Risk management is, in a word, complicated. Hmmm... not strong enough – make that two words, it's extremely complicated. Read More

Oh Hai! Apple TV Officially Hacked
While Apple's back was turned prepping for its October 20th Keynote, one hacker going by the handle p0sixninja decided to put the Greenpois0n jailbreak to the test and officially jailbreak the new Apple TV. P0sixninja, aka Joshua Hill, used a as-yet unreleased version of the hacking software, that also jailbreaks iPads and iPhones. As you can see from the picture he posted proudly on his Twitter, the Greenpois0n hack was a success, with the software appearing in the Apple TV menu. Read More


WHITE PAPER: Hitachi

Virtualization: Maximize Efficiency and Performance
In virtualized server environments, the selection of the storage environment (such as direct attached storage versus storage area network) and choice of the storage system, itself, are critical. The Hitachi Adaptable Modular Storage 2000 family provides unsurpassed reliability, performance and ease of use for VMware environments. Learn more. Read Now

Fraud in China up 10 per cent compared with 2009
A large number of companies in China have been impacted by at least one type of fraud in the last year, according to the latest edition of the Kroll Annual Global Fraud Report. Read More

Images from a homeland security experiment
Department of Homeland Security officials recently simulated the release of airborne contaminants in Boston's subway system, known locally as the 'T.' The exercise aimed to gauge how the air flows in order to be ready in the event of a real security incident. Read More

10 spooky Halloween iPhone apps
Apps that range from frightening to frighteningly useless Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Goodies from the Subnets
We've got 15 copies of books up for grabs: Cisco Nexus Switching and Microsoft SQL Server 2008 R2 Unleashed. Enter to win one!

SLIDESHOWS

The world's coolest data centers
Data centers need to be secure, temperature controlled, spacious, redundant, reliable – nothing sexy. But that doesn't mean they can't be. Here are a few that rise above the crowd and take advantage of the possibilities.

10 spooky Halloween iPhone apps
iPhone app developers have been working overtime this year to help you transform your favorite device into a high-tech scarephone. Have they succeeded? We'll let you be the judge of these 10 spoooooooky iPhone apps.

MOST-READ STORIES

  1. Red Hat CEO: Software vendor model is broken
  2. HP opens attack on Cisco certifications
  3. iOnApple: Apple revamps the MacBook Air
  4. Does Fallout New Vegas jump the cockroach?
  5. Twitter: Who is reading your DMs? There's an app for that ...
  6. Secrets of Windows Back Office Servers
  7. Limitations of software-as-a-service highlighted at Gartner ITxpo
  8. Open source report: Android vendors concede tablet market to Apple
  9. Privacy? Run a background check on yourself
  10. Hybrid technology to deliver HDTV throughout home

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment