Search This Blog

Tuesday, February 05, 2013

Juniper routers open to attack

  We need a critical infrastructure cybersecurity policy | Security-as-a-service gaining popularity
 
  Network World Security

Forward this to a Friend >>>


Juniper routers open to attack
A flaw has cropped up in Juniper's router operating system that can cause the systems to crash and reboot. Read More


RESOURCE COMPLIMENTS OF: Network World Technical Seminar

SDN, Openflow and Network Virtualization event comes to NYC
Attend and learn how SDN works, its potential in the enterprise, and why leading, bellwether organizations are leveraging it for data center and large-scale networking efficiency- Learn more and register for this free event. February 12, 2013 – Grand Hyatt, NYC Click to continue

RESOURCE COMPLIMENTS OF: IDG Research

New Survey: Purchase Process of Enterprise Technologies
Tell us about the buying process for enterprise technologies in Network World's Technology Influence Survey! This survey should take about 10 minutes of your time. To thank you, you will have the opportunity to enter a sweepstakes to win a $250 cash prize*! Please be assured your responses are confidential. To participate, click on the link below. *Due to regulations, prize sweepstakes is only open to legal U.S. and Canadian (except Puerto Rico and Quebec) residents, age 18 or older.

We need a critical infrastructure cybersecurity policy
Reports are that the latest round of cyber-attacks have been aimed at large media outlets like the NY Times, Wall Street Journal and Washington Post. Before media, large banks and other financial institutions were being targeted. Before the financial industry it was something else. All the while the US Government is under constant bombardment from potential cyber threats probing for weakness. Read... Read More

INSIDER
Security-as-a-service gaining popularity
Security delivered as a cloud service has several benefits, including costs and flexibility, but there are some cautions, too, adopters say. Read More

Safeguard your code: 17 security tips for developers
The scary stories from the Web are getting worse. First there were a few stolen credit card numbers. Then there were a few thousand. Now we hear about millions of financial records being exposed by security breaches, and we grow numb to the potential threat. Credit card numbers barely scratch the surface of what the bad guys are after, and there are more dangerous stories that come out of the labs studying cyber war. Read More


WEBCAST: PhoneFactor

Strong Security for Remote Workers Is Just a Phone Call Away
Join Steve Dispensa, PhoneFactor Chief Technology Officer, and Sarah Fender, PhoneFactor Vice President of Marketing & Product Management, to learn how phone-based authentication is helping companies tackle complex authentication challenges. Learn More

How to create a strong password in wake of Twitter hack episode
Twitter's warning about hackers is another reminder about the importance of password protection. Read More

Chinese hackers use compromised USA university computers to attack us
Let's say you have your email locked down so that it does an excellent job of identifying spam; people and businesses have their own folders or labels. Let's also say you have a rapid-fire delete finger for any email that doesn't fit nicely into the categories above. If an email goes into its corresponding folder and appears to come from a "trusted source"-- be it a family member, business associate,... Read More

Cisco: There's no place safe for Web surfers
Web surfers don't have to indulge in risky online behavior to expose themselves to malware, according to Cisco's annual security report. Read More


WHITE PAPER: CA Technologies

Reduce Data Protection Complexity
Choosing the right data protection solution should not add to the complexity and challenges of meeting the everyday demands of the business. Data protection can be simple to deploy, use and fit into IT's budget, but more importantly make systems, applications and data available 24/7. Learn More

Japan police to ally with hackers in tactical shift
Japanese police are adopting a new strategy for fighting cybercrime that includes teaming up with hackers to catch criminals. Read More

Oracle releases Java patch update
The February patch was offered today -- ahead of schedule -- and contains fixes for 50 vulnerabilities Read More

Obama to issue cybersecurity executive order this month
President Barack Obama is expected to issue a cybersecurity executive order in the days after his Feb. 12 State of the Union address. Read More

US wants Amazon, Apple, BlackBerry, Google and Microsoft to get a grip on mobile security, privacy concerns
When it comes to relatively new technologies, few have been developing at the relentless pace of mobile. But with that development has come a serious threat to the security of personal information and privacy. Read More

FTC's $50,000 Robocall Challenge nets 744 ideas to shut down robocallers
The Federal Trade Commission today said the submission period for its Robocall Challenge had ended and it got 744 new ideas for ways to shut down the annoying automated callers. The FTC noted that the vast majority of telephone calls that deliver a prerecorded message trying to sell something to the recipient are illegal. The FTC regulates these calls under the Telemarketing Sales Rule and the Challenge... Read More

 
 
 

SLIDESHOWS

2013's 25 Geekiest 25th Anniversaries

A look back at the most memorable tech-related happenings of 1988.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 2013's 25 geekiest 25th anniversaries

2. iPhone 6 rumor rollup for the week ending Feb. 1

3. Microsoft has no reason to save Dell

4. BlackBerry's Super Bowl ad: It's already a loser

5. Fedora, openSUSE ditch MySQL, in a major database shake-up

6. The Samsung Galaxy S 4 shows up in New Zealand

7. The 12 techiest Super Bowl ads of all time

8. Amazon.com suffers outage: Nearly $5 million down the drain?

9. How BYOD saved VMware $2 million

10. Samsung Galaxy S 4 buzz still white-hot

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: