Search This Blog

Friday, July 19, 2013

Cisco releases security patches to mitigate attack against Unified Communications Manager

  SCADA vendor faces public backlash over bug bounty program | Why We Are Disabling Reputation Settings in SharePoint 2013 Discussions Lists
 
  Network World Security

Forward this to a Friend >>>


Cisco releases security patches to mitigate attack against Unified Communications Manager
Cisco Systems released a security patch for its Unified Communications Manager (Unified CM) enterprise telephony product in order to mitigate an attack that could allow hackers to take full control of the systems. The company also patched denial-of-service vulnerabilities in its Intrusion Prevention System software. Read More


WHITE PAPER: F5

The Shortfall of Network Load Balancing
Applications running across networks encounter a wide range of performance, security, and availability challenges as IT department strive to deliver fast, secure access. Read this paper to learn why applications fail, why network load balancing alone offers little protection, and why context-aware application delivery is so critical. Learn more

WHITE PAPER: Sophos, Inc.

Network protection and UTM Buyers Guide
This buyers guide is designed to help you choose the right solution for your organization. It looks at the factors you should consider when evaluating solutions to ensure you have the protection and functionality you need, both now and as your business evolves. View Now

SCADA vendor faces public backlash over bug bounty program
Bug bounty programs are rather popular these days. Companies such as Google, Microsoft, and Mozilla pay respectable amounts of money to researchers who disclose vulnerabilities to them. While the argument can be made that some vulnerabilities are worth far more on the open market than the bounty paid, most vendors respect this and offer as much as they can, but do so knowing they can't compete with many organizations. Read More

Why We Are Disabling Reputation Settings in SharePoint 2013 Discussions Lists
Even if you don't enable "community features," SharePoint 2013 Discussion Lists have a much improved user experience over SharePoint 2010. However, if you enable Community features in a team site or start your site with the Community Site template, your site and discussion list get some nice enhancements that create a much more engaging user experience for conversations. Read More

'Free iPhone' text spammer gets small smack on the behind from FTC
An Internet marketer who blasted consumers with millions of deceptive spam text messages promising free iPhones and iPads settled charges with the Federal Trade Commission today. The settlement doesn't amount to much as it, as is typical in lots of these cases, forces the defendant Henry Nolan Kelly to pay back the $60,950 he made from the scam, but suspends the payment for "Kelly's inability to pay,"... Read More


WHITE PAPER: IDG

The 2013 Wi-Fi Challenge
The makers of network infrastructures have been working hard to keep their solutions up to the task of handling new challenges of high-density RF and network management, security, and performance management. So what do the leading vendors provide and how do their solutions differ? Learn more.

Most enterprise networks riddled with vulnerable Java installations, report says
Despite the significant Java security improvements made by Oracle during the past six months, Java vulnerabilities continue to represent a major security risk for organizations because most of them have outdated versions of the software installed on their systems, according to a report by security firm Bit9. Read More

Google Glass susceptible to poison-pill QR code
Researchers at Lookout mobile security say that they've figured out a way to make Google Glass execute potentially harmful commands by getting it to read a maliciously crafted QR code. Read More

12 of the worst data breaches of 2013 so far
Read More


WHITE PAPER: Kaspersky

The CISO's Guide To Virtualization Security
This guide describes the security challenges within virtualized environments and shows how to apply the concepts of Forrester's Zero Trust Model of information security to secure the virtual environment effectively. Learn more.

Quick look: Yahoo Chief Marissa Mayer's first year
Acquisitions, culture change have kept Yahoo CEO Mayer busy Read More

Tech groups ask US for transparency in secret data requests
Influential technology companies and groups want the U.S. government to lift restrictions on publicizing secret requests for user data as the fallout continues over the scale of government surveillance. Read More

Is the help desk the forgotten part of enterprise security defense?
A survey of 900 information technology professionals found almost half of enterprise help desks have gaps in security controls and training that could help ward off attacks like social-engineering assaults. Read More

Security Threat Landscape - July 2013
Security Threat Landscape - July 2013 Security Threat Landscape - July 2013. From: networkworld Views: 0 0 ratings Time: 00:00 More in Entertainment Read More

 

SLIDESHOWS

Can your IP address give away your identity?

Can hackers, stalkers, criminals, and other Internet users track you down by your Internet Protocol (IP) address?

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Hacking to rig election earns college student one-year prison sentence

2. Facebook Open Compute project has "weaknesses," Cisco CEO says

3. Citrix edges Microsoft and VMware in VDI face-off

4. Firefox OS for phones is shipping, and it is impressive

5. iPhone 5S specs leaked: NFC, 12-MP camera, and fingerprint authorization sensor expected

6. Cisco building an Internet of Everything router: Chambers

7. Can your IP address give away your identity?

8. Is Microsoft starting from scratch with Windows Phone 9?

9. FBI Ransomware spotted on Mac OS X

10. Yahoo buys Admovate to ramp up its mobile advertising

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: