Search This Blog

Friday, May 20, 2011

Google rolling out fix for Android authentication vulnerability

China's Great Firewall "father" pelted with egg, shoes | Personal data of Massachusetts' unemployed stolen

Network World Security

Forward this to a Friend >>>


Google rolling out fix for Android authentication vulnerability
Yesterday security experts were bemoaning the fact that the fragmentation of Android could create significant delays in patching at least some of the 99 percent of phones based on Google's operating system that were shown vulnerable to authentication attacks. Now Google says it has that concern covered. From a Computerworld story on our site: Read More


WHITE PAPER: Dell

The Business Case for Security Information Management
It is a mistake to assume that information security is solely a technical problem left for IT to solve. This guide is a non-technical discussion of security information management. Learn more.

WHITE PAPER: Dell

IT Managers Face Security Challenges with Mobile Devices
A recent IDG survey reveals data security is the top barrier to supporting employees' mobile devices. Read more

China's Great Firewall "father" pelted with egg, shoes
Somewhere George W. Bush might be laughing.  The BBC is reporting that China officials are looking for a man who allegedly threw an egg and shoes at the designer of the country's Great Firewall technology. Read More

Personal data of Massachusetts' unemployed stolen
As if being unemployed isn't bad enough, 210,000 unemployed residents of Massachusetts may have had personal data about them stolen from the state agency that is supposed to be helping them out. Read More

Siemens industrial-control security vulnerability could be disclosed today
Although a public talk about new vulnerabilities found in Siemens industrial control systems (ICS) was pulled yesterday from a conference agenda due to its sensitive nature, the head of the vulnerability-test group that discovered the security holes said it expects Siemens will soon have a fix and will be discussing it. Read More


WHITE PAPER: BMC Software

A Cost-Effective Solution for ITSM
If you're tired of the costly upgrades and difficult implementations other vendors put you through, BMC Remedy OnDemand offers an alternative. It can be implemented in days and significantly lower overall IT Service Management costs. Read the white paper to learn more about BMC Remedy OnDemand. Read More Today!

File Sharing or Privacy Breaching Service? Beware!
In a perfect world the idea of ubiquitously sharing and using data files from anywhere around the globe is a great idea. Some might even invent an esoteric term for it like Cloud Computing. File hosting services definitely provide convenience to people on the go. Until it doesn't; such as the aftermath of security breach, resulting in a spill of private or confidential information. Read More

Six rising threats from cybercriminals
Hackers never sleep, it seems. Just when you think you've battened down the hatches and fully protected yourself or your business from electronic security risks, along comes a new exploit to keep you up at night. It might be an SMS text message with a malevolent payload or a stalker who dogs your every step online. Or maybe it's an emerging technology like in-car Wi-Fi that suddenly creates a whole new attack vector. Read More

California looks to protect smart meter data
The California Public Utilities Commission has proposed state rules for ensuring the security of data collected by new smart metering technology. Read More


WHITE PAPER: Diskeeper Corporation

NEW Diskeeper 2011 Pro Premier Edition
Diskeeper 2011 Pro Premier edition provides essential performance and efficiency increases for power workstation users as well as all the features of the Professional edition. Learn more!

Senators: New smartphone tracking law needed
Two senators call for new online privacy laws. Read More

Mac App Store's slow updates expose users to security risks
Apple's Mac App Store puts users at risk because it's slow to update vulnerable software, a security researcher said Wednesday. Read More

Cloud-based Security Event Management?
Security Incident and Event Management (SIEM, though some people still use SIM or SEM) has been around for about a decade now. Originally built to capture, normalize, process, and correlate firewall and IDS logs, it is now participates more extensively in areas like log management, security analysis and forensices, regulatory compliance, and risk management. Read More

Gov't: We want stored emails, phone locations. New bill: Get a warrant!
It's about time! A new bill introduced to the U.S. Senate would update digital privacy laws and finally require the government to get a probable-cause warrant before snagging email and other private communications stored in the cloud. Mostly . . . Read More

Ireland hopes security measures attract big cloud providers
IDA Ireland, the state agency that is soliciting cloud providers, touts the country's youthful, well-educated and skilled labor force, attractive tax policy, business-friendly climate, access to markets throughout the European Union -- and its "secure" IT infrastructure. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from Cisco Subnet: 15 copies of IPv6 for Enterprise Networks. Enter here.

SLIDESHOWS

A quick guide to '4G' phones
We've created this handy guide to 4G smartphones – all of which are based on the Android operating system right now – to help you look past the marketing rhetoric and learn what to really expect from these phones.

MOST-READ STORIES

  1. Microsoft: One in 14 downloads is malicious
  2. Cisco to dump Linksys, WebEx?
  3. Gov't: We want stored emails, phone locations. New bill: Get a warrant!
  4. Microsoft's cloud licensing changes: what you need to know
  5. To 2011 grads: Go to the bathroom, don't be a jerk and take risks
  6. TinKode hacked NASA's Goodard Space Flight Center
  7. Cisco looks to reboot its business model
  8. Almost all Android phones vulnerable to authentication attack
  9. The coming battle between Android and Windows Phone 7
  10. The 11 most influential online worlds of all time

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: