Monday, July 22, 2013

Black Hat: Top 20 hack-attack tools

  U.S. high-tech industry feeling the heat from Edward Snowden leaks | Wyndham lawsuit tests FTC's data security enforcement authority
 
  Network World Security

Forward this to a Friend >>>


Black Hat: Top 20 hack-attack tools
Turn someone else's phone into an audio/video bug. Read More


WHITE PAPER: Kaspersky

Build Your IT Security Business Case
In this latest whitepaper from Kaspersky Lab, you'll find useful facts, examples and business case arguments to help you get buy-in and commitment from your business. Learn More.

WHITE PAPER: Tripwire

SANS Secure Configuration Management Demystified
Security experts and analysts agree that a systematic, enterprise-wide program of secure configuration management is one of the most beneficial security solutions you can implement. It provides an objective, concise measure of your overall security posture. Learn More

U.S. high-tech industry feeling the heat from Edward Snowden leaks
The disclosures about the National Security Agency's massive global surveillance by Edward Snowden, the former information-technology contractor who's now wanted by the U.S. government for treason, is hitting the U.S. high-tech industry hard as it tries to explain its involvement in the NSA data-collection program. Read More

Wyndham lawsuit tests FTC's data security enforcement authority
A federal court judge in New Jersey on Wednesday agreed to allow the U.S. Chamber of Commerce and several other organizations to seek the dismissal of a closely watched data breach lawsuit filed by the Federal Trade Commission against Wyndham Worldwide Corp. Read More

Vulnerability found in Java 7 opens door to 10-year-old attack
Security researchers from Polish vulnerability research firm Security Explorations claim to have identified a new vulnerability in Java 7 that could allow attackers to bypass the software's security sandbox and execute arbitrary code on the underlying system. Read More


WHITE PAPER: Sophos, Inc.

Network protection and UTM Buyers Guide
This buyers guide is designed to help you choose the right solution for your organization. It looks at the factors you should consider when evaluating solutions to ensure you have the protection and functionality you need, both now and as your business evolves. View Now

In the run-up to security conference Black Hat, all apps are suspicious
In the run-up to security conference Black Hat, all apps are suspicious Navigating city streets, walking to work... you see cell phones, everywhere. Three out of four of those are Android, according to Gartner. Users might feel c... From: networkworld Views: 0 1 ratings Time: 03:09 More in Science & Technology Read More

UK to probe Huawei's cybersecurity evaluation center
The U.K. government is launching a review of a vetting process for products from Huawei Technologies, reflecting continuing security concerns about the Chinese company. Read More

With universities under attack, security experts talk best defenses
Faced with millions of hacking attempts a week, U.S. research universities' best option is to segment information, so a balance can be struck between security and the need for an open network, experts say. Read More


WHITE PAPER: Code 42 Software, Inc.

Top 3 Reasons Why File Sync/Share is Not Endpoint Backup
Employees unknowingly create corporate data security risks by adopting these easy-to-use, personal applications. Understanding at a high level the primary purpose of each application helps differentiate between them. Read this executive brief to learn the differences. Learn more.

Put an Umbrella over your endpoint devices to stop malware, botnets and phishing
Did you know that malware and botnet detection spikes 200% every Monday? The OpenDNS Umbrella Security Service is designed to to put an end to Malware Mondays. Read More

Attackers embedding backdoors into image files
Researchers at Sucuri, a firm focused on website security awareness and attack recovery, have discovered attackers using a known, but a rather uncommon method of maintaining access to an already compromised server: They're hiding backdoors inside the headers of legitimate image files. Read More

Symantec: Google Glass still vulnerable to Wi-Fi attack
Google fixed one Wi-Fi security problem with its wearable computer Glass, but Symantec says there's another problem, which has been a long-known weakness in wireless networking. Read More

 

SLIDESHOWS

Can your IP address give away your identity?

Can hackers, stalkers, criminals, and other Internet users track you down by your Internet Protocol (IP) address?

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. iPad 5 rumor rollup for the week ending July 18

2. 'This is a 3D printed jet engine'

3. Just like that, Android 4.3 is out, ahead of its release date

4. Hijacking Office 365 and other major services via cookie re-use flaw

5. New vulnerability found in Java 7 opens door to 10-year-old attack

6. Apple, Samsung phone security features to be scrutinized

7. Yahoo chief Marissa Mayer's first year

8. Facebook Open Compute project has "weaknesses," Cisco CEO says

9. Cisco building an Internet of Everything router: Chambers

10. Citrix edges Microsoft and VMware in VDI face-off

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment