Monday, January 23, 2012

Anonymous dupes users into joining Metaupload attack

Cutting-edge electronics will require US to revamp auto defect investigations | Security roundup: Anonymous attacks DOJ, RIAA sites; Israeli-Palestinian cyberconflict escalates

Network World Security

Forward this to a Friend >>>


Anonymous dupes users into joining Metaupload attack
The Anonymous hacking group recruited unwitting accomplices in Thursday's attacks against U.S. government sites, a security researcher said today. Read More


WEBCAST: ForeScout Technologies

Experts Help CIOs Rethink Threat Prevention
This webcast examines sophisticated and targeted threats, security gaps, techniques and new technologies with regards to understanding and defending against zero-day threats, propagating worms, low-and-slow attacks and advanced persistent threats (APT). Learn more.

RESOURCE COMPLIMENTS OF: LogMeIn

Provide instant on-demand remote support with LogMeIn Rescue
Without pre-installed software, quickly connect to PCs, Macs, smartphones and tablets anywhere in the world. Get in, solve the problem, and be done in a flash. Plus, Rescue's SaaS-based platform means free upgrades and zero maintenance. Try it free today.

Cutting-edge electronics will require US to revamp auto defect investigations
The often complex, interconnected electronics systems now proliferating across most cars and truck will require the US government that watches over auto safety -- the National Highway Traffic Safety Administration (NHTSA) -- to revamp the way it handles and researches problems. Read More

Security roundup: Anonymous attacks DOJ, RIAA sites; Israeli-Palestinian cyberconflict escalates
Angered by the move by federal authorities to shut down the popular website Megaupload on charges it illegally shared movies, TV shows and e-books, hackers said to be working on behalf of the hactivist group Anonymous late yesterday launched denial-of-service attacks against a number of websites, including that of the Department of Justice (DOJ) and the Recording Industry Association of America (RIAA). Read More


WHITE PAPER: Bradford Networks

(BYOD) Unleashed in the Age of IT Consumerization
IT departments need to understand what devices are trying to connect to their networks, so they can provide convenient, secure access to those that are authorized, including personal iPads and smartphones. This white paper explains how IT departments can implement a practical and secure strategy and offer the convenience mobile devices provide. Read more

Kodak: A look at the icons of an icon
American photography icon Kodak this week filed for Chapter 11 bankruptcy protection after 131 years in business. The company was the originator of the handheld film camera and in 1975 invented the digital camera which largely spelled the end of the film business Kodak dominated. Here we take a look at the products and services that made Kodak famous. Read More

Reduce the conflicts between IT administrators and information security personnel
Sometimes the simplest solutions to problems evade us because we cannot see the forest through all the trees. In this case, the forest and trees I'm referring to are the people and policies that are in place to manage the operations and the information security of business networks. A few common-sense practices can reduce the conflicts between teams with a shared mission but disparate approaches. Read More


WHITE PAPER: Quantum

Big Data: Managing Explosive Growth
Are you experiencing a data explosion? The trend toward leveraging Big Data for competitive advantage helps IT professionals successfully meet business goals. Learn how to reliably manage, store and access vast amounts of archived data while protecting it and keeping costs low. View Now

The Future of Firewall Policies
The majority of today's firewalls have only IPv4 source and destination address objects in their policies. However, many of our firewalls are IPv6-capable and allow security administrators to configure either IPv4 or IPv6 policies. Over time, maintaining two firewall policies will become burdensome. Read More

FBI busts programmer for stealing US Treasury code
The FBI said it arrested a computer programmer in New York this week and charged him with stealing proprietary software code from the Federal Reserve Bank of New York. The software known as the Government-Wide Accounting and Reporting Program (GWA) handles all manner of U.S. government financial transactions. Read More

McAfee due to patch spam relay problem in cloud product
McAfee expects to patch by Thursday two problems with its SaaS Total Protection antimalware service, one of which lets an attacker use a computer as a spam relay. Read More

How smarter hypervisor use can lead to a 'big, big change' in security
To gain insight on the months ahead as they relate to IT attacks, malware, cloud security, and the impact of virtualization on security, we recently chatted with Simon Crosby, former CTO of Citrix Systems' data center and cloud business. Crosby recently founded a cloud security startup, Bromium, with Guarav Banga, former CTO and senior vice president at Phoenix Technologies, and Ian Pratt, chairman of Xen.org and co-founder of XenSource. Read More



SLIDESHOWS

12 available devices to test drive Windows 8
Here are a dozen off-the-shelf devices that Microsoft says it uses in its labs to put Windows 8 through its paces. You, too, can buy one if you haven't already.

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. iPad 3 rumor rollup for the week ending Jan. 18
  2. Can employee-owned devices save companies money?
  3. Hacking critical infrastructure systems now as easy as pushing a button?
  4. Anonymous takes out DoJ, RIAA in response to Megaupload.com take-down
  5. U.S. losing high-tech jobs, R&D dominance to Asia
  6. Tips for Facebook Timeline Apps: Beware what you share
  7. Megaupload.com shut down, execs jailed
  8. Galaxy Nexus smartphone a worthy upgrade
  9. Top 7 truths about consumerization of IT
  10. Another reason for Cisco to pound its chest

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment