Search This Blog

Tuesday, September 06, 2011

Cyberwar & Certified Lies: 531 Spy Certs target CIA, Google, Microsoft, Mozilla

Security rundown for the week ending Sept. 2 | Symantec adds enhancements to Backup Exec 2010

Network World Security

Forward this to a Friend >>>


Cyberwar & Certified Lies: 531 Spy Certs target CIA, Google, Microsoft, Mozilla
It's been a big weekend in the spoofed spy cert arena which has guaranteed that Internet giants have not had a long, fun weekend - thanks to DigiNotar which is now and should be blacklisted to hell. It's not just regular Joes in the crosshairs of this attack either, since Intelligence agencies like the CIA, the UK's MI6 and the Israeli Mossad were also targeted by 531 rogue digital certificates. Pretty... Read More


WHITE PAPER: IBM

Realize More Business Value
Read the white paper and learn how IBM Tivoli® Security Management for z/OS® can safeguard your business—and deliver rapid ROI. Read Now

WHITE PAPER: GFI Software

Why Customers Love VIPRE Business
Selecting an antivirus solution for your organization is an important decision. VIPRE Antivirus Business is a high-performance solution that delivers fast, memory-efficient endpoint security with all the necessary functionality you need and nothing you don't — ensuring an optimal end user performance experience. Read now!

Security rundown for the week ending Sept. 2
A mish-mash of security issues came up this week, everything from how to protect virtualized environments to a system that protects copper in utility sites from robbery and a story about digital certificate thefts. Read More

Symantec adds enhancements to Backup Exec 2010
Symantec announced last week at VMworld 2011 that they are adding new V-Ray technology and other enhancements to Backup Exec 2010. Read More


WHITE PAPER: PhoneFactor

Phones Become the Leading Multi-Factor Authentication Device
According to a leading analyst firm phone-based authentication will comprise 61% of the multi-factor authentication market by the year 2014. This paper will address the key drivers for this market shift away from security tokens and includes real-world case studies from organizations that have made the move to phone-based authentication. Read now

10 ways to enhance Google+
Read More

FAA slaps $175,000 fine on MIT for batteries that caught fire at FedEx
The Federal Aviation Administration (FAA) today said it would seek a $175,000 civil penalty against the Massachusetts Institute of Technology (MIT) for alleged violations of Department of Transportation Hazardous Materials Regulations. Read More


WHITE PAPER: Entrust, Inc.

A Practical Approach to Authentication
Enterprise authentication used to be simple: passwords for everyone, expensive tokens for a small number who work remotely. But the workforce is now mobile and confidential data is at risk. CIOs are now challenged to increase authentication security while preserving operational and budget efficiency. Read Today!

Search and seizure: No Fourth-Amendment rights at Borders
In 2002, the Homeland Security Act established the Department of Homeland Security (DHS) combining a number of U.S. law enforcement andd. The US Customs Service and the Immigration and Naturalization Service contributed to the formation of the newly named Immigration and Customs Enforcement (ICE) and the Customs and Border Protection (CBP) agencies. Read More

Man gets six years for hacking girls to extort photographs
A 32-year-old paraplegic was sentenced to six years in prison for infecting more than 100 computers in a quest for financial information, nude photographs and thrills. Read More



SLIDESHOWS

The world's geekiest license plates
This slideshow goes out to all those drivers who aren't afraid to say it loud: I'm a geek and I'm proud. It's filled with images of vanity plates so geeky that they prompted someone else to take a picture and post it on Flickr. Enjoy.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

MOST-READ STORIES

  1. DoE devices security system to thwart rampant copper thefts
  2. Age bias in IT: The reality behind the rumors
  3. Microsoft's 5 biggest weaknesses
  4. Microsoft's IE will drop under 50% share by mid-2012
  5. Mapping the price of pot across the Internet
  6. Lenovo heats up price war with $199 IdeaPad tablet
  7. 10 energy projects that could electrify the world
  8. The Ruby Principle tells us Apple didn't fake latest 'lost iPhone'
  9. Microsoft claims its private cloud is up to four times cheaper than VMware's
  10. Desktop virtualization users say the technology brings challenges

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: