Friday, July 19, 2013

Hijacking Office 365 and other major services via cookie re-use flaw

Microsoft to feds: Let us explain our dealings with the NSA | Could Government Integrators Take Their Big Data Security Analytics Skills to the Commercial Market?

Network World Security

Forward this to a Friend >>>


Hijacking Office 365 and other major services via cookie re-use flaw
How to use cookies to hijack accounts on Office 365, Amazon, eBay and plenty others. Read More


RESOURCE COMPLIMENTS OF: Check Point Software Technologies

Check Point 2013 Internet Security Report
Based on research of 900 companies and 120,000 hours of monitored traffic, this internet security report outlines the real risks faced by enterprises. For example, our study found that 63% of the organizations were infected with bots and 36% of the financial organizations sent credit card information outside of the company. Download the full report >>

WHITE PAPER: Biscom, Inc.

Securely Send Files with the Click of a Button
The message Biscom hears from our customers and prospective customers is clear and consistent: sending a file securely needs to be extremely easy for their users, or adoption of the solution will be challenging. Learn More.

Microsoft to feds: Let us explain our dealings with the NSA
Frustrated by laws that prevent it from talking about how and when it turns over customer information to the federal government Microsoft is asking Attorney General Eric Holder to clear the way to publicly share more details about that process. Read More

Could Government Integrators Take Their Big Data Security Analytics Skills to the Commercial Market?
After the terrorist attacks of 9/11, intelligence agencies and law enforcement organizations in Washington realized they had a problem. Federal agencies had pockets of intelligence spread all over the place and needed to consolidate them into massive data repositories. Additionally, the feds needed help sorting through the noise to find nuggets of true intelligence value. Read More


WEBCAST: IDG

Mobile Device Performance in High-Density Environments
Industry analyst Joanie Wexler explores this topic with Özer Dondurmacıoğlu from Aruba Networks and Bruce Miller from Xirrus, discussing how a high-density Wi-Fi design can handle the flood of traffic from smartphones, tablets and other mobile devices. View now.

Tumblr issues security update, asks users to change passwords
Tumblr, the blogging site recently acquired by Yahoo, has released a security update for its iPhone and iPad apps that it said addresses an issue that allowed passwords to be compromised in certain circumstances. Read More

California Attorney General releases breach report
In the first report of its kind, California's Attorney General, Kamala D. Harris, had revealed that 2.5 million people -- roughly 6.5 percent of the state's population -- were exposed by data breaches in 2012. Read More


RESOURCE COMPLIMENTS OF: LogMeIn

Powerful and secure remote support with LogMeIn Rescue
For companies that want to compete in their industry, improving the customer experience is a top priority. To do that, having an on-demand remote support solution is essential. That's why companies around the world choose LogMeIn Rescue to provide powerful, secure support of any device, anytime, anywhere. Rescue offers a simple, reliable interface packed with all the features technicians want. Check out LogMeIn Rescue to learn more and start your free trial today.

Colliding, exploding stars may have created all the gold on Earth
Two dead stars smashing into each other and releasing massive amounts of energy may have created all of the heavy elements such as gold found on Earth. Read More

FBI Ransomware spotted on Mac OS X
The so-called "FBI Ransomware" that has targeted Microsoft Windows users for years is now striking Mac OS X computers, security researchers warn, but add that the Mac version of the malware is technically different and much easier to remove. Read More

Hacking to rig election earns college student one-year prison sentence
A former college student was caught using keylogging software to steal classmates' passwords and vote himself into office as student body president, and that's not even the worst of it. Read More

Security company to release testing tool for SAP mobile access
As SAP invests heavily in mobile, a security testing company will release a tool next month to ensure mobile-accessible SAP systems are not vulnerable to hackers. Read More


SLIDESHOWS

Can your IP address give away your identity?

Can hackers, stalkers, criminals, and other Internet users track you down by your Internet Protocol (IP) address?

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Cisco building an Internet of Everything router: Chambers

2. Small, electric-powered nano-lasers may help keep Moore's Law valid

3. How Google and Blue Box sparked an important open source discussion

4. Hijacking Office 365 and other major services via cookie re-use flaw

5. New digitally signed Mac malware confuses users with right-to-left file name tricks

6. Can your IP address give away your identity?

7. Petition calls for an end to passwords

8. What IT recruiters know about you -- whether you're looking or not

9. Death of India's telegram system

10. Bill Gates vows the return of Microsoft Bob


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment