Search This Blog

Friday, October 21, 2011

FAQ on Son of Stuxnet

Researchers find way to tighten control over mobile device data | Skype Exploits: I know where you are, what you are sharing, and how to best stalk you

Network World Security

Forward this to a Friend >>>


FAQ on Son of Stuxnet
Duqu is primarily a remote-access Trojan targeted at a limited number of organizations in Europe, Africa and the Middle East to gather intelligence that can help plan a future attack. Read More


RESOURCE COMPLIMENTS OF: Cisco Systems

Context-Aware Security for BYOD Trend
Concerned about the "Bring Your Own Device" (BYOD) trend? Although an "Any Device" environment is becoming essential for today's workplace, new risks and problems may result if your infrastructure isn't ready. Join IDC's Chris Christiansen and Cisco Systems as they discuss security architecture and solutions to address challenges for BYOD. Register Now

WHITE PAPER: ExtraHop

Application Performance Management
In this eGuide, Network World, with sister publication CIO, offer news on the latest trends, best practices, and straightforward advice on these solutions and the challenges of managing application performance. Learn More!

Researchers find way to tighten control over mobile device data
For some time now, many security experts have argued that rather than focus efforts on locking down endpoints, the focus needs to be on keeping the data itself secure. Just last week, we covered a number of the findings from the Human Behavior and Security Culture workshop, held by the Tuck School of Business at Dartmouth. Those at the workshop discussed a Hotel California strategy to data protection -- enabling data to be checked out, but to never leave a prescribed area. Read More

Skype Exploits: I know where you are, what you are sharing, and how to best stalk you
While lurking at Wilders Security Forum, I ran across a link to a research paper filled with terrible news for the half-billion registered Skype users. Security researchers have uncovered some really serious security and privacy flaws in Skype that could reveal the identities, locations over time, digital files, and even P2P activity of hundreds of millions of Skype users. In fact it's bad news for... Read More

By the numbers: The impact of data breaches
Websense 'Security Pros and Cons' survey of 1,000 IT managers confirms that data breaches are widespread. Here's a look at how organizations are responding. Read More


WHITE PAPER: Oracle

The Application Grid Approach to a Modern Data Center
An application grid approach significantly automates the process of adding, reducing, or modifying existing IT deployments in support of highly scalable systems that have less downtime and lower resource consumption. Learn More!

Adobe to fix Flash flaw that allows webcam spying
Adobe is working on a fix for a Flash Player vulnerability that can be exploited via clickjacking techniques to turn on people's webcams or microphones without their knowledge. Read More

Amazon Silk offers increased security on open Wi-Fi networks
The cloud-based design of Amazon's Silk browser has positive security side effects because it encrypts all traffic between users and websites, especially important when connected over unprotected Wi-Fi networks where session hijacking attacks can occur easily, the company said. Read More

Google Apps failing LAPD, says advocacy group
A consumer advocacy group yesterday released documents it has obtained that indicate that CSC, the prime contractor for Google Apps services for Los Angeles, has allegedly not managed to meet the security requirements of the Los Angeles Police Department. Read More


WHITE PAPER: CA Technologies

The Changing Role of IT
This white paper analyzes research conducted by IDG Research Services about the changing role of IT: what's driving the change, what skill-sets will be more valued and what should forward-looking IT executives consider as IT shifts increasingly towards an IT supply chain model. Learn More

Massive SQL injection attack has comprised nearly 200,000 ASP.Net sites
Hackers are in the midst of a massively successful SQL injection attack targeting websites built on Microsoft's ASP.Net platform. About 180,000 pages have been affected so far, security researchers say. Read More

Symantec, McAfee differ on Duqu threat
Symantec and McAfee appear to have come to slightly different conclusions about the specific dangers posed by a newly discovered Trojan program called Duqu. Read More

20 high-tech toilets
Lights, music, action! Today's tricked-out toilets have it all Read More

Gartner: 16 long-held IT business practices you need to kill
With CIO budgets heading for their 11th consecutive year of growing at 3% or less, it's time to offer up some sacred caws for sacrifice. Read More



SLIDESHOWS

2011 tech industry graveyard
Fortunately for the tech industry, there's a lot more living than dying, with 2011 seeing the birth of everything from Apple's iPad 2 to the Google+ social network. But inevitably, 2011 has also seen its share of dead, killed, murdered, offed, obliterated companies, technologies and ideas as well. Here's your chance to pay last respects, and who knows, maybe a few of these will sprout back to life.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center and Microsoft training of the winner's choice from Webucator.. Enter here.Also: Please take our survey on certifications and your career

MOST-READ STORIES

  1. Cheap power: An overnight revolution
  2. 'You have to be masochist to be an IT person': FedEx CIO
  3. Android smartphone smackdown: Droid Razr vs. Galaxy Nexus
  4. Gartner: 16 long-held IT business practices you need to kill
  5. Gartner: The top 10 strategic technology trends for 2012
  6. Gartner: 10 key IT trends for 2012
  7. SQL injection attack has compromised nearly 200,000 ASP.Net sites
  8. Day 1: Giving up Windows 7 for Ubuntu 11.10 for two weeks
  9. OpenFlow and SDN: Networking's future?
  10. BlackBerry losing sway in enterprise, study finds

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: