Friday, January 07, 2011

Microsoft plans to patch critical Windows bug next week

The Impact of IPv4-Address Exhaustion on the Security of the IPv4-Only Internet | Massive ice-bound telescope set to capture elusive space particles

Network World Security


TOP STORY: Microsoft plans to patch critical Windows bug next week
Microsoft today announced it would release just two security updates next week to patch three vulnerabilities in Windows. Read More

WHITE PAPER: Long-Term Data Retention – Key Considerations (Quantum Corporation)
Managing backup and recovery in today's environment is a multi-dimensional challenge with both near and long-term business requirements. Recent technological developments in disk backup have had a positive impact on short-term data retention strategy. This tool provides key topics to think about as you design your long-term data retention plans. Read Now

The Impact of IPv4-Address Exhaustion on the Security of the IPv4-Only Internet
When there will be no more IPv4 /8 blocks in the IANA pool, then the IPv4 dark net will be reduced to a meager 10./8. This article explains the impact on bogon filters and sinkholes.With the IPv4-address exhaustion becoming closer and closer, there could be an impact on some security techniques used by Internet Service Providers (ISP) and other security organizations. Indeed, ISPx rely on the fact that part of the IPv4 address space is not allocated in order to prevent and detect attacks with two techniques that will be described in this article. This non-allocated IPv4 address... Read More

Massive ice-bound telescope set to capture elusive space particles
IceCube project should shed light on neutrinos, mysterious dark matter, cosmic rays What do you get when you drill 86 holes 1.5 miles deep into the frozen ice of the South Pole, install some 5,160 light sensors and network them to a computer system above? Read More

WHITE PAPER: Stop Fraudulent Transactions (ParAccel)
Learn how creative, iterative analysis detects and halts fraud in minutes, rather than hours or days by leveraging: • Massively Parallel Processing • Columnar database for faster responses • Schema-neutral, no tuning required • Built-in compression and encryption Read now!

Security researcher finds way around Flash sandbox
A security researcher has found a gap in the way Adobe Systems has fortified its Flash Player for better security, which could result in data being stolen and sent to a remote server. Read More

The weirdest, wackiest and stupidest sci/tech stories of 2010
From exploding Droids to robotic pack mules and Apple weirdness it was a wacky year Read More

WHITE PAPER: The Top 10 Reports for Managing Vulnerabilities (Qualys Inc.)
This free guide covers the key aspects of the vulnerability management lifecycle and shows you what reports today's best-in-class organizations are using to reduce risks on their network infrastructure. Read now!

Study: A third of all malware in history created in 2010
More than a third of all malware that has ever existed was created by criminal gangs in 2010 alone according to the latest PandaLabs Annual Report. Read More

Self-Encrypted Drives Set to Become Standard Fare
We've seen this coming over time: Based on the Trusted Computing Group's standard, hard drives and solid state drives (SSD), are offering self-encryption built-in. The key difference with these next-generation encrypted drives is that these units have the encryption integrated into a single chip on drive in the drive. Read More

WHITE PAPER: Tackle the Most Challenging Analytic Queries (ParAccel)
Learn how a columnar-based, massively parallel processing database can provide ultra fast analytics with: • Schema-neutral, load-and-go analysis • High performance against complex SQL workloads • All-in-memory processing Read now!

WikiLeaks fiasco prompts new Fed effort to boost data security
The White House has called on all government to review processes in place to identify workers who may be inclined to disclose classified data to whistleblowers like the WikiLeaks Web site. Read More

Tech That Will Matter in 2011
The road ahead reveals technology news, companies, websites, gadgets, and people that will affect your route in 2011. Read More


BECOME AN INSIDER
Get premium content, in-depth reviews, practical tips and exclusive research. All for just signing up. Sign up for free today.

SLIDESHOWS

The weirdest, wackiest and stupidest sci/tech stories of 2010
It's hard to pick the weirdest and wackiest tech stories of 2010 considering there is so much nuttiness to choose from. But we'll give it a shot. Here we take a look at a number of stories that gave us pause in 2010.

2010's most popular iPad apps
As the iPad celebrates its first birthday, it should raise a glass to Apple's App Store, which has provided users with an array of innovative applications. Late last week, Apple released a list of the 10 most popular iPad applications, with productivity apps making up the bulk.

MOST-READ STORIES

  1. Cisco unveils Internet TV and more at CES
  2. Microsoft bashes Apple while previewing next-gen Windows
  3. 30 most anticipated tech products of 2011
  4. CES 2011: Gadgets galore
  5. AT&T LTE service to launch by midyear
  6. At CES, Lenovo marries Windows and Android
  7. What it's like to make the wrong job switch
  8. Worm planted in fake Microsoft security update
  9. Top 12 tech embarrassments of 2010
  10. Motorola rolls out Droid Bionic

Get more IT peer perspective online:
LinkedIn Group | Facebook | Twitter



You are currently subscribed to networkworld_security_alert as security.world@gmail.com.
Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment