Search This Blog

Monday, January 21, 2013

RSA: How to steal encryption keys off hardware chips and smart cards

  Conficker worm returns to attack photography enthusiasts | Cisco confirms Linksys firmware flaw, says only one router
 
  Network World Security

Forward this to a Friend >>>


RSA: How to steal encryption keys off hardware chips and smart cards
Cryptography Research, known for its crypto system-breaking stunts, will be at it again at the RSA Conference in San Francisco next month when it shows a way to steal encryption keys off hardware chips and smart cards. Read More


WHITE PAPER: Pkware, Inc.

Controlling the Risks and Costs Surrounding Dormant VMs
Explore the security and compliance vulnerabilities presented by dormant virtual machines. This whitepaper defines the risks of dormant VMs, and explores best practices for compliance and the secure management of a virtual environment. Learn More.

WEBCAST: PhoneFactor

Strong Security for Remote Workers Is Just a Phone Call Away
Join Steve Dispensa, PhoneFactor Chief Technology Officer, and Sarah Fender, PhoneFactor Vice President of Marketing & Product Management, to learn how phone-based authentication is helping companies tackle complex authentication challenges. Learn More

Conficker worm returns to attack photography enthusiasts
Electronics accessory maker Hama has admitted that a 35mm photographic film scanner sold to German consumers over Christmas came with a software disk infected with the irrepressible Conficker worm. Read More

Cisco confirms Linksys firmware flaw, says only one router
The company said on Thursday that the serious vulnerability was solely in the Linksys WRT54GL router Read More


WEBCAST: CDW Corporation

Unified Threat Management: A Better Approach to Security
In this Webcast you will learn how Unified Threat Management (UTM) combines firewall, IPS, Web filtering, antivirus and more in a single box to combat a broad range of threats efficiently and economically. Learn More.

Cornell prof: Manti Te'o girlfriend story a "perfect storm of internet deception phenomena"
I swear, I wasn't looking for a Network World angle to the Manti Te'o "girlfriend" hoax that has crossed over from sports story to national news this week. But then a press release from Cornell University dropped into my inbox, with thoughts on the Notre Dame linebacker affair by Jeff Hancock, a professor of communication and of computer and information science: Read More

Ex-Microsoft execs look to tie –up sex merchandise business in India
This had to be an interesting job change. The former head of business development for Microsoft Singapore has a new job: running a "discreet" online sex shop targeted at the apparently huge market in India. Read More


WHITE PAPER: HP, Microsoft & Intel

Big Data Requires a Remodeling of the Data Warehouse
Take a few moments to learn about a data warehouse appliance that is a massively parallel server optimized to run Microsoft's SQL Server that delivers enterprise scalability, ease of maintenance, and a single version of the truth, all for a low cost. Read Now!

Identity and access management as a cloud-based service eliminates time, pain and cost
Gartner says that identity and access management offered as a cloud-based service (IDaaS) is an up-and-coming market for a growing need. As more enterprises utilize more applications as a service (SaaS), they need an easy way to provision users and oversee the rights that have been assigned. Read More

Researchers easily crack Philips hospital IT system
A Philips information management system used in making hospital administrative chores more efficient contains vulnerabilities that can be exploited to gain full control of the product, a security vendor says. Read More

What's lurking in your network? Find out by decrypting SSL
Organizations have spent vast sums of money on security systems and, when deployed and operated correctly, they play a key role in safeguarding the organization. However, most systems have one critical dependency: The traffic flowing through must be readable. If the traffic is encrypted, many systems are almost completely useless, giving the system owner a false sense of security. Read More

 
 
 

SLIDESHOWS

9 essential Internet Explorer 10 add-ons
Quality add-ons for Internet Explorer are few and far between.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Tony Fadell on the unique nature of Apple's design process
  2. Truth in IT job postings: What those want ads really mean
  3. RSA: How to steal encryption keys off hardware chips and smart cards
  4. 2013 job watch: Top 11 metro areas for tech jobs
  5. Security Holy Grail anyone?
  6. 'Rogue clouds' giving IT staffs nightmares
  7. Cisco working on an IT simplification platform
  8. Verizon client worker outsourced part of his job to China so he could have more free time
  9. Blogger's request jolts lawmakers into 'emergency' mode
  10. Day after patch, Java zero-day sold to highest bidders
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: