Search This Blog

Friday, February 18, 2011

7 ways to avoid getting hacked by Anonymous

FBI: Web-based services hurting wiretapping efforts | Microsoft downplays threat of new Windows zero-day

Network World Security

Forward this to a Friend >>>


7 ways to avoid getting hacked by Anonymous
The hactivist group Anonymous used a series of simple technical and social exploits to crack the network of security-technology firm HBGary Federal, giving the company a schooling that other network security pros can learn from. Read More


WHITE PAPER: PC Mall

A Powerful Platform for Virtualization
Download this HP white paper to learn how the next-generation ProLiant servers can help companies achieve rapid ROI and dramatically lower their operational expenses. Read More

WHITE PAPER: St. Bernard Software

Compare Web Filters, Enter to win an iPad
View this demo of iPrism Web Filter and learn why throughput speeds of up to 100+ Mbps, anti-virus protection, and seamless Active Directory/Terminal Services integration and reporting included at no charge has made iPrism the appliance-based choice for organizations of all sizes. Learn More

FBI: Web-based services hurting wiretapping efforts
Web-based services are frustrating law enforcement agency's ability to have real-time wiretaps, an FBI lawyer says. Read More

Microsoft downplays threat of new Windows zero-day
Microsoft is downplaying the threat posed to Windows users by a recently-revealed vulnerability, saying it's unlikely the bug could be exploited to compromise a computer. Read More

US Senators want to almost triple drone/national airspace test sites
Push part of FAA reauthorization bill and could move unmanned aircraft closer to national airspace accessIn a move that could move unmanned aircraft closer to gaining access to national airspace, a couple of US senators are backing an amendment that would increase the number of test sites for such access from  4 to 10. Read More


WHITE PAPER: VeriSign

The State of Internet Vulnerability
What's being done to alleviate Internet vulnerabilities? Are you, or your company, susceptible to threats such as man-in-the-middle attacks and cache poisoning? This white paper reports the results of recent research and examines who is affected by Domain Name System insecurities. Read Now

RSA: Act now on cyberwar, security experts caution
The time has arrived for the U.S. to develop a strategic plan for dealing with threats against critical infrastructure and those targeting U.S. economic interests, security experts said at the RSA conference. Read More

How IT pros cheat on certification exams
Incidents of cheating on IT certifications are on the rise, a trend that experts say is an outward sign of the desperation felt by out-of-work and under-employed IT professionals. Read More

X Prize $30 million private race to the moon is on
X Prize gets 29 teams to compete for $30 million in prizes to get to moonThe master competition masters at X Prize Foundation are at it again.  Today the group announced the 29 international teams that will compete for the $30 million Google Lunar X Prize, the competition to Read More


WHITE PAPER: Scriptlogic

PacketTrap IT Network & IT Infrastructure Management
PacketTrap IT is a comprehensive solution that solves problems with bandwidth, connectivity, network & infrastructure performance quickly & easily. PacketTrap supports multiple sites, is easier to use & more complete than traditional network monitoring products. Download a FREE 21 day trial. Learn More

IT execs at RSA extol virtues of cloud computing, with familiar caveats
Deciding to move enterprise data into cloud-computing environments is still a decision fraught with anxiety over security, as well as operational and legal issues, say IT managers, but the prospect of cost savings and ability to "burst" data into the cloud during peak periods is proving irresistible. Read More

U.S. patients trust docs, but not e-health records, survey shows
Patients in the U.S. trust their doctors, but not the electronic health records those doctors are now implementing, according to a soon-to-be-released study from CDW Healthcare. Read More

Stolen HBGary e-mails indicate it was planning a "new breed of rootkit"
E-mails stolen by hactivist group Anonymous indicate that the security company it targeted was planning to make a "new breed of rootkit" and that it passed along t plan to a technoe company's plan to a technology firm that caters to the federal government. Read More

Senators explore new website seizure options
U.S senators will introduce legislation this year targeting websites that traffic in digital piracy or counterfeited goods, said the primary sponsor of a controversial bill proposed in 2010 that would give government agencies more authority to shut down those sites. Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a Windows 7 Enterprise Technician class for three people. From Cisco Subnet: 15 copies of AAA Identity Management Security. Enter here.

SLIDESHOWS

When IT professionals cheat
We asked 200 IT professionals to tell us how often IT workers cheat on certification exams, buy fake gear or illegally share software. Here are the results.

Tech 'firsts' that made a President's day
From the first presidential steamboat ride to the introduction of electricity in the White House to Obama's famous BlackBerry, our nation's commanders in chief have always enjoyed the privilege of being exposed to technology's cutting edge -- even if they haven't always embraced the opportunities.

MOST-READ STORIES

  1. How IT pros cheat on certification exams
  2. Microsoft IE9 not a 'modern browser,' Mozilla exec claims
  3. Banshee Amazon Store disabled in Ubuntu 11.04 by Canonical
  4. Jennings explains his Jeopardy loss to Watson
  5. Stolen HBGary e-mails indicate plans for a "new breed of rootkit"
  6. Geekiest marriage proposals of all time
  7. Full-duplex radio breakthrough can double Wi-Fi capacity
  8. iPad productivity tools: 3 must-haves
  9. Top 12 Google Labs experiments
  10. Tablets, smartphones force Cisco to rethink how security works

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: