Thursday, September 08, 2011

Ten years after 9/11, cyberattacks pose national threat, committee says

Space scientist, MIT PhD, pleads guilty, gets 13 years in prison for espionage | Three Top Open Source Bug Tracking Apps

Network World Security

Forward this to a Friend >>>


Ten years after 9/11, cyberattacks pose national threat, committee says
Ten years after the terrorist attacks of Sept. 11, 2001, the nation faces a critical threat to its security from cyberattacks, a new report by a bipartisan think tank warns. Read More


WHITE PAPER: VeriSign

Best Practices for a Rapidly Changing Threat Landscape
This paper describes how Verisign draws on their success and hands-on engagements with customers in a range of industries to identify a set of best practices that enables organizations to keep pace with DDoS attacks while minimizing impact on business operations. Read Now!

WHITE PAPER: F5

Wide Area Application Architecture and Exchange 2010
Massive consolidation can lead to single points of failure which could interrupt service of critical applications. ESG believes that this risk should be addressed by building applications on a Wide Area Application Architecture (WAAA) foundation, spreading applications across multiple data centers. Learn More!

Space scientist, MIT PhD, pleads guilty, gets 13 years in prison for espionage
A space scientist with a PhD in Planetary Sciences from the Massachusetts Institute of Technology who once worked for NASA, the Department of Energy, the Department of Defense, and the White House's National Space Council, pleaded guilty today to attempted espionage for offering classified satellite information to a person he believed to be an Israeli intelligence officer. Read More

Three Top Open Source Bug Tracking Apps
Bugs in software are as difficult to avoid as death and taxes, which makes keeping track of known bugs an important task for quality-conscious developers. With many feature-rich open source bug-tracking programs available, choosing a suitable application can be a daunting task. The best bug tracking solution for your organization or project depends upon your specific needs and personal preference.... Read More

DigiNotar certificates are pulled, but not on smartphones
Browser makers have generally been quick to react to the computer compromise at digital certificate issuer DigiNotar, but that hasn't been the case for all mobile phone makers. Read More


WHITE PAPER: GFI Software

PCI-DSS Compliance and GFI Software Products
The intent of this document is to provide you with GFI's understanding of the requirements, and how the GFI Software product line can assist you to meet PCI compliance as outlined in the PCI DSS Requirements. Read now!

More than two decades after inventing the Web, Berners-Lee fights to keep it open
The Web will officially hit adulthood this coming Christmas, which will mark 21 years since computer scientist Tim Berners-Lee first initiated communications between an HTTP client and a Web server, thus marking the dawn of the so-called "information age" that defined the 1990s. The linking of hypertext with transmission control protocol is now so routine that we forget how revolutionary it really was at the time. Even Berners-Lee, in a question-and-answer session posted on the World Wide Web Consortium in 2008, seemed to downplay his own role in creating such a world-changing technology. Read More

Start up offers Saas app to manage data-breach incidents
If your company suffered a data breach, would you know what to do to comply with state, federal and local law? Start-up Co3 Systems is offering a software-as-a-service (SaaS) application to tackle that unhappy task, tracking how a corporate data-loss incident is handled. Read More

IBM, 3M team to glue together high-powered silicon bricks for servers, smartphones
IBM and 3M today said they will jointly develop a new line of adhesives they hope will let them make it possible to build commercial microprocessors composed of layers of up to 100 separate chips. Read More


WHITE PAPER: Entrust, Inc.

A Practical Approach to Authentication
Enterprise authentication used to be simple: passwords for everyone, expensive tokens for a small number who work remotely. But the workforce is now mobile and confidential data is at risk. CIOs are now challenged to increase authentication security while preserving operational and budget efficiency. Read Today!

Norton Internet Security 2012
Norton Internet Security (NIS) 2012 adds new features to the suite's toolkit, including those to enhance PC performance and make some basic use of the cloud; it also adds some tweaks to the interface. This is not a major overhaul, but the addition of new tools makes a useful piece of protection software even more valuable. Read More

Wikileaks: Online infiltrators often take credit for terrorist attacks
Analysts at an Israeli company that infiltrates online forums to identify terrorists often claim responsibility for attacks to bolster their credibility, according to a recently-leaked cable from the U.S. Department of State. Read More

ISP Customer Sales FAIL: using 'it's OK they all invade privacy' argument
Over the weekend, a guy from a different ISP than I use swung by my house. He was, of course, hoping to talk me into switching ISPs. But when I mentioned reading an article about that ISP hijacking users' search queries, in order to further line their pockets with profits, he had no idea to what I was referring. Read More

Free security tool detects banking malware
A Finnish penetration testing company has released a free tool it says can detect all variants of five major families of malicious software that steal online banking credentials. Read More

vShield, Cloud Computing, and the Security Industry
As VMworld winds down today, several security vendors including BitDefender, Catbird, Lumension, McAfee, Sophos and Symantec announced their intentions to work with VMware as a security partner or integrate with VMware vShield APIs. These vendors join Trend Micro -- a company that bet on vShield integration and is clearly benefiting from this decision. Read More



SLIDESHOWS

What do top CIOs make?
How high can a senior IT leader ascend in the ranks of a public company? High enough to rank among a company's most highly paid executives. High enough to enjoy perks such as company cars, financial planning services, and access to the corporate jet.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

MOST-READ STORIES

  1. What online news looked like on 9/11
  2. Apple takes Chinese food company to task over their logo
  3. Microsoft blacklists all DigiNotar certificates
  4. HP (again) shows us how not to do it
  5. ATM hack gives cash on demand
  6. Scammer "crams" $35 million in false phone charges -- from prison
  7. 10 scariest hacks from Black Hat and Defcon
  8. Comodo hacker claims credit for DigiNotar attack
  9. Rice demonstrates full-duplex wireless technology
  10. 10 ways to enhance Google+

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment