Tuesday, September 20, 2011

Google patches 32 Chrome bugs, revs browser to v.14

Former cybersecurity czar Clarke says smartphones, digital certificates create huge security problems | ACLU on Massive Surveillance Society: Reclaim Privacy, American Liberties

Network World Security

Forward this to a Friend >>>


Google patches 32 Chrome bugs, revs browser to v.14
Google today patched 32 vulnerabilities in Chrome, paying more than $14,000 in bug bounties as it also upgraded the stable edition of the browser to version 14. Read More


WHITE PAPER: GFI Software

Why Customers Love VIPRE Business
Selecting an antivirus solution for your organization is an important decision. VIPRE Antivirus Business is a high-performance solution that delivers fast, memory-efficient endpoint security with all the necessary functionality you need and nothing you don't — ensuring an optimal end user performance experience. Read now!

RESOURCE COMPLIMENTS OF: Palo Alto Networks

10 Things Your Next Firewall Must Do
Choosing a next-generation firewall is more than a simple comparison of technical features. It's about balancing the needs of the business with the risks associated with modern applications. Gain access to valuable information in one location- read articles and watch videos that will empower you to make the right decision. Learn more!

Former cybersecurity czar Clarke says smartphones, digital certificates create huge security problems
Former White House cybersecurity adviser Richard Clarke, author of the book "Cyber War," served 19 years in the Pentagon, intelligence community and State Department. At the firm he founded, Good Harbor Consulting, he advises clients on security risk management; is an on-air consultant for ABC News; and also teaches at Harvard's Kennedy School of Government. Read More

ACLU on Massive Surveillance Society: Reclaim Privacy, American Liberties
The ACLU has warned that we must speak up now to reclaim our liberties that have been stripped from us in the "state of emergency" mentality decade and "surveillance society" following 9/11 in the United States. It further warns that if we do not, then the "ever-expanding" claims of national security will permanently sacrifice key freedoms like "our right to privacy and our ability to speak, dissent,... Read More

Get Professional Security Testing with BackTrack
BackTrack Linux has established itself as the de facto suite of choice for security professionals and administrators who want to find any possible holes in their servers, systems, and networks. This bootable Linux distro includes a complete set of tools that can help you not only assess the security of your system but also aid in uncovering possible break-ins, making it an essential part of any administrator's... Read More


WHITE PAPER: Quest Software

New NetVault Backup Licensing Model
Read a report from an industry-leading analyst to see why traditional backup and recovery licensing methods no longer make sense. You'll learn how you can dramatically cut costs with a different strategy that's more intuitive, reasonable, enduring, and flexible. Download the report today. Read Now!

HIPAA on phones, faxes and e-mail
My wife Deborah Black (light of my life) is a neuropsychiatrist who works at two different clinics. Sometimes patients are referred from one clinic to the other, and the question arises of how to transmit the details of their medical record from one team to the other. Read More

Hackers hit Japan's biggest defense contractor
Japan's largest defense contractor, Mitsubishi Heavy Industries, today acknowledged that scores of its servers and PCs had been infected with malware, but denied that any confidential information had been stolen. Read More

NASA photo: The day the "Star Trek" crew met the real Enterprise
When NASA rolled out its Space Shuttle Enterprise in 1976 it was met by not only NASA dignitaries, but also some of the cast from the "Star Trek" television series. According to NASA, there was a good reason for the Star Trek folks to be there. That's because Enterprise, the first Space Shuttle, was originally to be named Constitution (in honor of the U.S. Constitution's Bicentennial that year).... Read More


WHITE PAPER: Raritan

Best Practices: KVM Smart Card Authentication Systems
Selecting a smart card-enabled KVM system? Choose one that supports PKI authentication to multiple servers from a single location and makes the necessary KVM feature adjustments to enable seamless use of the reader. This White Paper examines best practices when evaluating a Smart Card solution. Learn More

US-Australia military pact deemed to cover cyberspace
For the first time, the U.S. has interpreted an existing treaty to include aggression in cyberspace as a trigger for international military cooperation. Read More

Researcher discloses zero-day flaws in SCADA systems
An Italian security researcher this week disclosed details of several zero-day vulnerabilities he discovered in SCADA products from multiple vendors, a disclosure likely to reinforce concerns about critical infrastructures. Read More

Pledge asks Chinese hackers to reject cybertheft
Two prominent Chinese hackers have released a convention calling for the rejection of cybertheft and are asking their peers to support it, as China is increasingly seen as the source of international hacking attacks. Read More



SLIDESHOWS

Cloud companies to watch: A product sampler
Our Cloud Companies to Watch story gives you the lowdown on a handful of startups looking to make their mark in a business so far dominated by the likes of Amazon, Google, Rackspace and VMware. Here's a closer look at some of the products and services being rolled out by these newcomers.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center and Microsoft training of the winner's choice from Webucator.. Enter here.Also: Please take our survey on certifications and your career

MOST-READ STORIES

  1. Has Google's CEO stopped using Google+?
  2. Blue Screen of Death gets new look in Windows 8
  3. 16 essential Android apps for IT pros
  4. iPhone 5 rumor roll-up for the week ending Sept. 16
  5. Enterprise WAN connectivity: MPLS VPN vs. Public Internet
  6. Inside Cisco's global security operations
  7. Windows 8 coming in 2012? 6 reasons why this could derail Windows 7 now
  8. 5 priorities for HP in data center switching
  9. ACLU on massive surveillance society: Reclaim privacy, American liberties
  10. Bot army being assembled, awaiting orders

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment