Wednesday, December 08, 2010

WikiLeaks, Critical Infrastructure, and Cyber Security

Hacked Indian investigation agency web site yet to return | Hackers promoted bogus terror attack at APEC 2009

Network World Security

Forward this to a Friend >>>


WikiLeaks, Critical Infrastructure, and Cyber Security
Critical infrastructure exposure isn't the problem, vulnerable critical infrastructure is. The world is up in arms about the WikiLeaks release of over 100 U.S. critical facilities, but some blame belongs with those who have failed to secure the infrastructure. Read More


E-BOOK: Palo Alto Networks

Get the "Next-Generation Firewalls for Dummies" Book
This book provides an overview of next-gen firewalls. Get your copy to find out: How Enterprise 2.0 applications create new risks for your organization? Why traditional firewalls can't protect your network? How next-generation firewalls stand apart from other security solutions? Click to continue

WEBCAST: Websense, Inc.

Securing the Social Web
Organizations around the world are racing to take advantage of social networking and media like Facebook, LinkedIn, and YouTube. Along with these new resources, comes new risk as user-generated content circumvents traditional security technologies such as antivirus and URL filtering. View Now

Hacked Indian investigation agency web site yet to return
Close to four days after the Web site of India's key investigation agency, the Central Bureau of Investigation (CBI), was hacked and defaced, it is still inaccessible to users. Read More

Hackers promoted bogus terror attack at APEC 2009
A well orchestrated phishing attack was behind the hacking attacks against Singapore Government and APEC officials at last year's Lion City meetings of the Asia Pacific Economic Cooperation Forum. Read More


WHITE PAPER: Watchguard

Unified Threat Management - Market Review
Compare the major brands of security products by UTM throughput per MSRP dollar to see where you will get the best value for your money. Find out how you can have full UTM capabilities for comprehensive protection and still have blazing fast throughput to keep your network humming. Read now!

New Facebook changes not a huge blow to privacy, say experts
Facebook's launch of a new profile layout doesn't offend privacy experts as much as past changes have elicited. Read More

Botnets and Web Threats Take Center Stage in Security Report
Symantec's MessageLabs says botnet controllers may hide in plain sight using steganographic techniques to hide commands in images and sound files. Read More


WHITE PAPER: Watchguard

10 questions to ask before you buy an anti‐spam solution
With so many anti-spam products on the market, how can you be sure you're getting the best solution for your business network? With these ten critical questions as your guide, you can cut through the marketing hype and zero in on the key features and benefits that should guide your decision. Read now!

Expert: As smartphones become wallets, pickpockets circle
Androids, iPhones and BlackBerries are becoming more like wallets each day -- and the bad guys are starting to take notice, eEye CTO Marc Maiffret warns. Read More

WikiLeaks furor spawns rival DDOS battles
A loosely affiliated group that launched distributed denial of service (DDoS) attacks against entertainment Web sites over copyright issues has started attacking sites viewed as being hostile to WikiLeaks, says a PandaLabs researcher. Read More

Fix to Chinese Internet traffic hijack due in January
Policymakers disagree about whether the recent Chinese hijacking of Internet traffic was malicious or accidental, but there's no question about the underlying cause of this incident: the lack of built-in security in the Internet's main routing protocol. Read More



Fill out a survey, get rewarded

Get a free Starbucks gift card for participating in a Network World survey about application performance management best practices. Research firm NetForecast is surveying enterprises about APM practices for an upcoming Network World article. The first 100 participants will receive a $5 Starbucks gift card. Click here.

December goodies from the Subnets
SharePoint 2010 power user training for three people from Webucator, plus a brand new iPad available from Microsoft Subnet. Five massive libraries on CCNP, security, NX-OS up for grabs on Cisco Subnet. Enter to win!

SLIDESHOWS

Top IT Turkeys of 2010
Thanksgiving is a time for giving thanks for all of the people and things we love, to cherish what's most important to us. But that's for another slideshow. This one's all about taunting the companies, products and people who most resembled a turkey over the last year. So cut me a hockey-puck-shaped slice of jellied cranberry sauce and read on.

Cool Yule favorites: 15 techie gifts we like
Ho Ho Ho, it's time again to get our holiday wish lists together. Here are our 15 favorite products from the 140+ products submitted and tested in this year's Cool Yule Tools holiday gift guide.

MOST-READ STORIES

  1. VMware to virtualize Android smartphones for business users
  2. Retailer accused of inflating Google ranking is arrested
  3. WikiLeaks' Assange arrested in London
  4. Stop freaking out about terrorism. Did TSA miss that memo?
  5. Best and worst celebrity technology moments of 2010
  6. Unwrapping Google's Android "Gingerbread" gift
  7. iPhone customers dump on AT&T in Consumer Reports survey
  8. Feds tracking Americans' credit cards in real-time without a warrant
  9. Juniper acquires virtualization security firm
  10. New Facebook changes not a huge blow to privacy, say experts

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment