Search This Blog

Monday, August 08, 2011

Black Hat: Researcher picks apart Sophos antivirus package

Security rundown for week ending Aug. 5, 2011 | FBI busts trio for selling stolen Apple iPhones, Macbooks from mall kiosk

Network World Security

Forward this to a Friend >>>


Black Hat: Researcher picks apart Sophos antivirus package
A researcher presenting at Black Hat picked apart Sophos Antivirus software and found it lacking in several areas that leave it vulnerable to attack or circumvention - something he says might apply to other antivirus vendors' products as well, but he just hasn't looked. Read More


WHITE PAPER: Qwest

Manage Complexity, Cost and Compliance
To outsource or not to outsource IT security—that is the question for enterprises as they face increasingly complex cyber threats. Managed security services can help organizations alleviate the cost and complexity of proactively securing the IT infrastructure. Read Now.

WHITE PAPER: CA Technologies

Ponemon: Security of Cloud Computing Providers
This report offers the cloud providers beliefs on the state of cloud security. In addition, it compares the findings from both reports, determining similarities and discrepancies between cloud computing users and providers. Learn More

Security rundown for week ending Aug. 5, 2011
If you'd never heard the phrase 'advanced persistent threat' before, you may have gotten an ear full of it the past week in a collection of news stories that used the APT term to describe a variety of network security problems that are causing big problems. Read More

FBI busts trio for selling stolen Apple iPhones, Macbooks from mall kiosk
The FBI said today it had arrested three mall cell phone kiosk workers for buying stolen iPhones and other Apple products and selling them for profit. The FBI said the arrests were based on an investigation of a large number of mobile devices stolen from riders of the region's mass transportation system, Washington Metropolitan Area Transit Authority, more commonly known as Metro. Read More

How to Conduct a Linux Server Security Audit
Nowadays many Linux servers are neither initially installed nor maintained by dedicated Linux administrators, yet IT professionals are responsible for their servers' security. If your server is compromised, not only can all your sensitive information be exposed, but your server can also become a tool in the wrong hands. To avoid such scenarios, make sure your server is properly configured and regularly... Read More

Build a Better Virus Trap, Win $200,000
In the 1996 movie "Ransom," Mel Gibson plays a wealthy man whose son is kidnapped for a multi-million dollar ransom. Rather than pay, he goes on TV and offers the ransom as a reward for the head of his son's kidnapper. Read More


WEBCAST: Cymphonix

Gain Complete Control Over Internet Bound Traffic
The Cymphonix Network Composer is the only network appliance that provides comprehensive clarity into all internet bound network traffic and simply powerful tools to manage that traffic with a holistic approach. Learn More Today!

Former Cisco engineer indicted on hacking charges
A former Cisco engineer at the center of an extradition controversy has been indicted by a federal grand jury on computer hacking charges. Read More

Has your company been infiltrated by the Shady Rat hack?
When McAfee released its Operation Shady Rat hacking report earlier this week, it didn't name all of the organizations it thought could have been hacked as part of a large, five-year ongoing campaign. Yours might be one of them. Read More

SAP will issue patch for NetWeaver vulnerability
A reportedly serious security bug affecting the J2EE (Java 2 Platform Enterprise Edition) engine in SAP's NetWeaver middleware will be patched soon, SAP said Friday. Read More

Scariest Black Hat story so far: Power plants at risk
Last night at Black Hat in Las Vegas, security researcher Dillon Beresford showed a group of reporters and government types how he can commandeer the Siemens S7 computers that are control many industrial operations, including power plants. Our report from IDG News Service reporter Robert McMillan notes early on that there are limits as to what Beresford is allowed to reveal publicly regarding his... Read More


WHITE PAPER: Dell

Security: A Multilayered Approach
The resources in this Security KnowledgeVault provide expert advice on everything from creating a multilayered security strategy and deploying a more proactive fight against cybercrime, to realizing when it's time to stop going it alone and seek outside, expert help. Learn more.

As targeted e-mail attacks proliferate, companies wince
The strange e-mails arrived in executives' inboxes around the same time that the Australian oil company was negotiating a deal with a Chinese energy company. Read More

'Shady RAT' hacking claims overblown, say security firms
Two security companies are questioning claims that a cyber espionage campaign uncovered by a rival firm was sophisticated or even extraordinary. Read More

Malware turns off Windows' UAC, warns Microsoft
Microsoft this week urged users to keep an oft-criticized Windows security feature turned on, even as it said that more malware is disabling the tool. Read More

Industrial controllers need security rewrite
The stripped down systems that control many manufacturing, utility and industrial processes have enormous security issues, researchers find. Read More



GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

SLIDESHOWS

Chromebooks you can buy now
Here's a roundup of computing devices that run Chrome OS, a few which you can buy now, or which may be on the way.

MOST-READ STORIES

  1. Scariest Black Hat story so far: Power plants at risk
  2. Leaked Verizon document reveals key launch dates
  3. Cisco Videoscape chief resigns
  4. Black Hat: routers using OSPF open to attacks
  5. VMware backpedals on price changes after customer criticism
  6. Black Hat: Lots of hacks and patriotic plea
  7. AT&T cracks down on free tethering and hotspots
  8. Webcam to computer users: Sit up straight
  9. South Korea fines Apple ... How much?
  10. 5 surprising IT skills that hiring managers want now

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: