Tuesday, July 23, 2013

SIM cards vulnerable to hacking, says researcher

  True tales of (mostly) white-hat hacking | Apple's developer site was hacked; customer information is safe
 
  Network World Security

Forward this to a Friend >>>


SIM cards vulnerable to hacking, says researcher
Millions of mobile phones may be vulnerable to spying due to the use of outdated, 1970s-era cryptography, according to new research due to be presented at the Black Hat security conference. Read More


RESOURCE COMPLIMENTS OF: LogMeIn

Powerful and secure remote support with LogMeIn Rescue
For companies that want to compete in their industry, improving the customer experience is a top priority. To do that, having an on-demand remote support solution is essential. That's why companies around the world choose LogMeIn Rescue to provide powerful, secure support of any device, anytime, anywhere. Rescue offers a simple, reliable interface packed with all the features technicians want. Check out LogMeIn Rescue to learn more and start your free trial today.

WHITE PAPER: Tripwire

SANS Secure Configuration Management Demystified
Security experts and analysts agree that a systematic, enterprise-wide program of secure configuration management is one of the most beneficial security solutions you can implement. It provides an objective, concise measure of your overall security posture. Learn More

True tales of (mostly) white-hat hacking
Stings, penetration pwns, spy games -- it's all in a day's work along the thin gray line of IT security. Read More

Apple's developer site was hacked; customer information is safe
A funny thing happened to Apple's Developer Center over the last few days. It was down. And stayed down. And though Apple put up a message on the developer website indicating that things would be back to normal soon, no one quite knew what was going on. Until now. Apple on Sunday emailed developers and informed them that there was a security breach on Apple's developer site this past Thursday. Read More

F5 data center firewall aces performance test
Huge data center, check. Multiple 10G Ethernet pipes, check. Load balancer, check. Firewall? Really? Do network architects need to buy yet another box, and likely take a performance hit? Not according to F5 Networks, which says its BIG-IP 10200v with Advanced Firewall Manager (AFM) can handle traffic at 80-Gbps rates while screening and protecting tens of millions of connections, and simultaneously load-balancing server traffic. Read More


WHITE PAPER: Code 42 Software, Inc.

The 5 Stages of Enterprise Endpoint Backup Grief
A large amount of mission-critical data exists exclusively on laptops and desktops - i.e. "endpoints" - making them a primary source of unnecessary data loss risk for today's organizations. Learn how Code 42 identified the five common stages of "enterprise endpoint backup grief." Learn more.

5 security best practices for SMBs
If your small-to-midsized business is like most, you're playing a game of chicken with cyber-criminals. You probably know that your defenses probably aren't able to repel today's sophisticated, persistent attacks, yet you hope that you'll be overlooked. (Insider content) Read More

For IP surveillance networks, smart PoE switches give an edge
An increasing number of businesses, school districts and healthcare facilities are delving into Smart Ethernet switches with Power-over-Ethernet (PoE) technology—and reaping big benefits for their IP Surveillance networks. Read More

Cyber drills like Quantum Dawn 2 vital to security in financial sector
Cyber exercises, like the Quantum Dawn 2 drill carried out by dozens of Wall Street firms this week, can be useful in helping financial firms close critical gaps in their incident response capabilities, analysts said. Read More


WHITE PAPER: Tripwire

10 Steps to Risk-based Security Management
Many professionals in information security espouse the belief—and commitment to—"risk based" security management. In fact, according to the latest Ponemon Report on Risk Management, 77% of those surveyed claimed a commitment to it. Learn More

Safeguard your code: 17 security tips for developers
Rigorous input testing, passwords, encryption -- security is a feature no programmer can afford to overlook. Read More

Samsung's potential government deal signals new era for mobile security
Samsung is close to inking a deal with the FBI and the U.S. Navy for mobile devices --placing a foot into the door that was previously blocked by BlackBerry (formerly Research in Motion). Read More

Apple confirms hack of its developer website
Apple on Sunday admitted that its developer website, which has been offline since Thursday, had been hacked and some information may have been stolen. Read More

 

SLIDESHOWS

12 of the worst data breaches of 2013 so far

The Identity Theft Resource Center, which tracks disclosed data breaches, has recorded 301 for the first half of 2013.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Black Hat: Top 20 hack-attack tools

2. iPhone 6 rumor rollup for the week ending July 19

3. Just like that, Android 4.3 is out, ahead of its release date

4. U.S. high-tech industry feeling the heat from Edward Snowden leaks

5. Apple's developer site was hacked; customer information is safe

6. MIT researchers teach TCP new tricks

7. F5 data center firewall aces performance test

8. Citrix edges Microsoft and VMware in VDI face-off

9. Cisco building an Internet of Everything router: Chambers

10. 'This is a 3D printed jet engine'

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment