Monday, November 28, 2011

Hackers target IPv6

Largest DDoS attack so far this year peaked at 45 Gbps, says company | 25 free open source projects IT pros will love

Network World Security

Forward this to a Friend >>>


Hackers target IPv6
If your IPv6 strategy is to delay implementation as long as you can, you still must address IPv6 security concerns right now. Read More


WHITE PAPER: i365

Trusted Data Assurance in the Cloud
Cloud-based services are here to stay. Cloud services are even more attractive for companies who are being hit with the high cost of meeting compliance requirements - especially for small and mid-size companies that have shrinking or no information security budget. Read now!

RESOURCE COMPLIMENTS OF: Palo Alto Networks

10 Things Your Next Firewall Must Do
Choosing a next-generation firewall is more than a simple comparison of technical features. It's about balancing the needs of the business with the risks associated with modern applications. Gain access to valuable information in one location- read articles and watch videos that will empower you to make the right decision. Learn More!

Largest DDoS attack so far this year peaked at 45 Gbps, says company
A week-long DDoS attack that launched a flood of traffic at an Asian e-commerce company in early November was the biggest such incident so far this year, according to Prolexic, a company that defends websites against such attacks. Read More

25 free open source projects IT pros will love
SourceForge expert points out 25 lesser-known projects for IT folks Read More

AT&T hackers have terrorist connections, say Philippines police
The Federal Bureau of Investigation and police in the Philippines have jointly busted a ring of four alleged hackers in Manila with connections to a terrorist group in Saudi Arabia, the Criminal Investigation and Detection Group of the Philippines police said last week. Read More


WEBCAST: ForeScout Technologies

CISO in the Know - Mitigating Modern Attacks
This webcast examines sophisticated and targeted threats, security gaps, techniques and new technologies with regards to understanding and defending against zero-day threats, propagating worms, low-and-slow attacks and advanced persistent threats (APT). Learn more.

Unpatched Apache reverse proxy flaw allows access to internal network
A yet-to-be-patched flaw discovered in the Apache HTTP server allows attackers to access protected resources on the internal network if some rewrite rules are not defined properly. Read More

FBI, DHS say no evidence of a hack in an Illinois water district pump failure
The FBI and Department of Homeland Security say they can't find evidence to confirm any of the story that an Illinois water authority's SCADA network was hacked and that it resulted in burning out a pump in the system. Read More

Cyberattacks a top national security concern, GOP candidates say
Three Republican presidential candidates at Tuesday's CNN-sponsored GOP debate said that cyberattacks pose an emerging national security threat to the U.S. Read More


WHITE PAPER: BMC

Managing Cloud Services from Request to Retirement
This lifecycle is tailored to the needs of the business, with both the flexibility to deliver the full required software stacks and the management rigor to ensure the operational integrity of the cloud. Learn More!

Hungarian hacks Marriott's systems to blackmail for job
A Hungarian citizen has pleaded guilty to stealing confidential information from the computers of Marriott International, and threatening to reveal the information if the hotel chain did not offer him a job maintaining the company's computers, the Department of Justice said on Wednesday. Read More

9 best practices for successful IT projects
Most often when the watchdogs at the Government Accountability Office are called into to check out an agency, process or project they are looking for something that has gone wrong. This week, however the group took a look at some government IT projects that have gone right and came up with some best practices other government agencies or in public corporations could emulate to achieve success in their own IT projects. Read More

Google protects its current HTTPS traffic against future attacks
Google has modified the encryption method used by its HTTPS-enabled services including Gmail, Docs and Google+, in order to prevent current traffic from being decrypted in the future when technological advances make this possible. Read More

RIPE questions registration freeze related to botnet bust
A Dutch organization responsible for allocating IP addresses to network providers in Europe is questioning an order by police to not allow changes to the registrations of four blocks of addresses that were used until recently by a known criminal network. Read More



SLIDESHOWS

Top IT Turkeys of 2011
You know, it just doesn't feel like Thanksgiving to me unless I have mashed potatoes, pumpkin pie, and an iPad with the annual Network World Top IT Turkeys slideshow all arranged on the table for the feast. So let's sharpen our knives and get to the carving, because these turkeys are getting cold.

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. Cisco reorgs again, folds net management into new cloud group
  2. Even Wales finds his wall-to-wall Wikipedia pictures 'annoying'
  3. 7 hot storage startups to watch
  4. 11 eye-popping Black Friday tablet, laptop and ereader deals
  5. 9 best practices for successful IT projects
  6. DARPA to banish 'geeky formal' way code defects are eradicated
  7. Maybe 802.11ad will dominate after all
  8. Interview with a pirate
  9. Top IT turkeys of 2011
  10. FCC chief declares AT&T/T-Mobile merger a turkey

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment