Search This Blog

Friday, October 28, 2011

DARPA offers $50,000 prize if you can figure out these shredded puzzles

History of malware: from script kiddies to rootkits | IBM anoints Q1 Labs technology as centerpiece of security portfolio

Network World Security

Forward this to a Friend >>>


DARPA offers $50,000 prize if you can figure out these shredded puzzles
If you like puzzles and think you could make shredded or severely damaged documents whole again in a particularly cool way, then the scientists at the Defense Advanced Research Projects Agency (DARPA) have a challenge for you. Read More


WHITE PAPER: Akamai Technologies, Inc.

Protecting Your Online Channels and Web Applications
This whitepaper gives a broad overview of the ways in which Akamai can help organizations bolster the security of their Web-based assets, with capabilities ranging across the application, network, and DNS layers, as well as solutions focused on Distributed Denial of Service (DDoS) mitigation and business continuity. Learn more

WHITE PAPER: Akamai Technologies, Inc.

Understanding Web Application Security
This paper examines current trends in Web application security, assessing the present threat environment as well as limitations in existing approaches to protection. Learn more

History of malware: from script kiddies to rootkits
Bitdefender put together this cool graphic that tracks the history of malware. In the early days, many of the worms were written by so-called script kiddies looking for some recognition. Fast forward to last year, where Stuxnet was written specifically to criple Iranian nuclear facilities -- and as it has now been publically disclosed has become the blueprint for other attacks. In 2011, it was the... Read More

IBM anoints Q1 Labs technology as centerpiece of security portfolio
IBM intends to make the security information and event management (SIEM) technology gained through the acquisition of Q1 Labs, which was officially closed yesterday, the centerpiece of IBM's broad security product portfolio. Read More

Security Market Boom?
If you pick up a copy of your local newspaper, you are likely to become depressed. There are protests like "Occupy Wall Street" going on throughout the U.S. as unemployment hovers around 9% nationally and is over 13% in some states like Nevada. Meanwhile, European powers are knee-deep in debt as they seek to bailout Greece and prepare for future problems in Italy, Portugal, and Spain. Read More


WHITE PAPER: Emerson Network Power

Data Center Infrastructure Design and Management
Does efficiency have to come at the expense of availability? Not according to this paper, which outlines the four data center infrastructure trends that are reducing design, operating and management costs while improving data center performance. Those trends are Infrastructure Management, Eco Availability, Flex Capacity and High Density. Learn more

Attackers trick Facebook users into exposing secret security codes
New social engineering attacks are tricking Facebook users into exposing anti-CSRF tokens associated with their sessions. These security codes allow attackers to make unauthorized requests through the victim's browser. Read More

Privacy a concern as Google links Plus with its other sites
Google's work to integrate its Google+ social networking site broadly with its other services could raise red flags for users who want to closely guard their privacy. Read More

FAA goes to the Web to fight lasers directed at aircraft battle
The Federal Aviation Administration wants you to go online to help it battle the growing safety problem of people pointing lasers at flying aircraft. Read More


WHITE PAPER: Trend Micro

Public Cloud Adoption Best Practices
According to a recent survey, 43% of businesses have experienced a cloud security issue or lapse in the last year. Learn how to adopt best practices specific for public cloud security that include VM-level security, multi-layered defenses, data encryption and third-party identity and access management. Learn More

Not Without a Warrant: Privacy Upgrade and Digital Liberty from Surveillance
If we do nothing but complain, take no action, things on the surveillance front are not going to get better, not on their own, not without a 'fight' to hold onto our freedoms, our rights, our country. No more snooping on our digital communications like the feds' phishing expeditions in hopes of finding something terrorism-related. We're not all terrorists. We are America's citizens, not the enemy.... Read More

NFC will help users find romance, store vital documents and experience 'magic,' boosters say
By now you're likely familiar with near-field communications (NFC) technology and its ability to help process mobile payments. But NFC's boosters think it's capable of more, oh, so much more. Read More

Kelihos botnet domain provider promises to make amends
Czech based free domain provider dotFree Group has settled the lawsuit brought against it by Microsoft in the Kelihos takedown case by suspending all abusive hosts registered through its service and promising better collaboration in the future. Read More

Duqu incidents detected in Iran and Sudan
Security vendor Kaspersky Lab has identified infections with the new Duqu malware in Sudan and, more importantly, Iran, the main target of the Trojan's predecessor -- Stuxnet. Read More

EFF, ACLU file lawsuits over Patriot Act data collection
Two civil liberties groups have filed lawsuits asking the U.S. Department of Justice to detail its collection of electronic data and other information under the 10-year-old counterterrorism law, the USA Patriot Act. Read More



SLIDESHOWS

20 high-tech toilets
Today's techiest toilets incorporate music players, motion-activated lids, heated seats, washing and drying functions, and more. Take a look.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center and Microsoft training of the winner's choice from Webucator.. Enter here.Also: Please take our survey on certifications and your career

MOST-READ STORIES

  1. New Nokia phone name, Lumia, means 'prostitute' in Spanish
  2. U.S. to fund aggressive technology that cuts solar power costs 75%
  3. Researchers find "massive" security flaws in cloud architectures
  4. RIM faces possible class action suit over BlackBerry outages
  5. Citrix: Virtual desktops about to become cheaper than physical ones
  6. 5 tech pros companies want to hire
  7. Target.com's second site crash could become e-comm nightmare
  8. Cloud security: Mission impossible
  9. Week 1: Ubuntu Unity instead of Windows 7 and ready to scream
  10. Social engineering: My career as a professional bank robber

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: