Tuesday, June 12, 2012

Stuxnet and Flame share code, development teams

Tech world preps to honor 'Father of Computer Science' Alan Turing, as centenary nears | NASA Mars Lab mission gets inflight software upgrade, more specific landing spot

Network World Security

Forward this to a Friend >>>


Stuxnet and Flame share code, development teams
The recently discovered Flame cyber-espionage malware has a direct connection to the Stuxnet malware used to attack programmable logic controllers at Iranian nuclear facilities two years ago, according to Kaspersky Lab, which says Flame and Stuxnet share some technical code that reveals a common development effort of some sort. Read More


RESOURCE COMPLIMENTS OF: BYOD & Mobile Device Management Tech Seminar

BYOD & Mobile Device Management Tech Seminar - 6/26
During this one-day tech seminar, IT executives, managers and teams will learn how to successfully manage the onslaught of new mobile devices, along with the strategies and policies that can help avoid pitfalls and ensure success. June 26 - Omni Parker House, Boston Click to continue

RESOURCE COMPLIMENTS OF: IT Roadmap Denver

Your IT Career Roadmap
This unique session is designed with you, the IT professional in mind. How can you build your personal brand, and properly design a career plan? How do you work with your staff to create a plan that retains your best talent? Come to IT Roadmap Denver for valuable information on how today's IT leaders build successful careers. Click to continue

Tech world preps to honor 'Father of Computer Science' Alan Turing, as centenary nears
Listening to the way people in the world of technology talk about Alan Turing, it's difficult to believe that the English computer scientist isn't more of a household name. Read More

NASA Mars Lab mission gets inflight software upgrade, more specific landing spot
Even as it hurtles towards an August 5 rendezvous with the red planet, NASA's Mars Science Laboratory (MSL) is being fine-tuned for a more precise landing and better operations once it reaches its destination. Read More


WHITE PAPER: Box

Disaster Recovery Services Providers Evaluation
Improvements in disaster recovery plans and broad business continuity strategies are top-of-mind concerns for leading enterprises today and recovery time is now measured in hours and minutes not days. These key insights are discussed in the 2010 Forrester Wave Report. Read Now!

Take it from 1000 Zombies: Google+ is no ghost town
Byron Rempel is a zombie artist - he draws zombies, as opposed to being one -- and he'll swear on any mother's grave that reports of the death of Google+ have been grotesquely exaggerated. He's also drawn me as a zombie (right). Read More

Cerf: Secret wartime projects drove 'incredible' advances
The Enigma cypher machine used by the German military in World War II is still a tough nut to crack today. The total number of ways it can be configured for every letter is around 150 million million million. That's enough to keep it beyond the reach of all but the most determined of brute force attacks. Read More


WHITE PAPER: Fluke Networks

How to Choose a Datacenter OTDR
This white paper helps fiber installers and network technicians understand the key parameters for selecting an OTDR. Choosing the right device not only solves this new generation of datacenter testing requirements, but also helps professionals work efficiently, and increase the reliability and value of the enterprise fiber network. Learn More!

Symantec and Microsoft team for disaster-recovery service
Symantec today announced a partnership with Microsoft to use Symantec storage and disaster-recovery products in tandem with Microsoft's Azure to allow continuous computing if a customer's main data site is severely disrupted. Read More

IPv6 Launch in India: A Security Risk?
Two days agoIndia, along with the rest of the world, saw the launch of IPv6 -- the new internet protocol which aims at replacing current IPv4 in its way. According to the Department of Telecom, 27 Indian websites have already stepped on to the IPv6 platform. Indian ISPs and government agencies have also hinted at following suite soon. Read More

Experts dispute sandboxing would have stopped Flame
Bigger lesson learned from Flame: Multiple layers of security needed, so when one technology fails, a second or third may succeed Read More

MySQL vulnerability allows attackers to bypass password verification
Security researchers have released details about a vulnerability in the MySQL server that could allow potential attackers to access MySQL databases without inputting proper authentication credentials. Read More



SLIDESHOWS

First Look: Apple's "beautiful" new MacBook lineup
Apple rolled out major upgrades for both of its main notebooks today at WWDC. Here's a quick look at the new MacBook Pro and MacBook Air.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Microsoft 'sorry' for raunchy Windows Azure video
  2. iPhone 5 rumor rollup for the week ending June 8
  3. The great Verizon Network Extender rip-off
  4. iPad price cut has sparked tablet computer price free fall
  5. Interdependencies could lead to cloud 'meltdowns'
  6. Gartner: Top 10 emerging infrastructure trends
  7. Googler on why he left ... for the third time
  8. Google's software-defined/OpenFlow backbone drives WAN links to 100% utilization
  9. How to determine if your LinkedIn password has been compromised
  10. Launch event drives IPv6 traffic to all-time high

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment