Search This Blog

Thursday, August 15, 2013

Quiz: Name that hacker

Microsoft moves to block MD5 certificates and improve RDP authentication | IBM to acquire endpoint security company Trusteer

Network World Security

Forward this to a Friend >>>


Quiz: Name that hacker
After breaking into networks for fun, profit, and to fulfill political agendas, some did prison time. Read More


WHITE PAPER: Pure Storage

Flash for All
Servers and networks get relentlessly faster and cheaper with Moore's Law, and as a result are now thousands of times faster than the mechanical desk storage to which they connect. Download this ebook to discover how your business can improve efficiency, compete better, and deliver compelling user experiences with flash. Learn more now.

WEBCAST: IBM

Webinar: IBM IIM for Fraud, Abuse and Waste in Government
View this IBM webinar to learn about the challenges and opportunities in fraud reduction, waste, and abuse in government programs and agencies. You will learn how IBM Intelligent Investigation Manager (IIM) can help your organization. Learn More.

Microsoft moves to block MD5 certificates and improve RDP authentication
Microsoft released two optional security updates Tuesday to block digital certificates that use the MD5 hashing algorithm and to improve the network-level authentication for the Remote Desktop Protocol. Read More

IBM to acquire endpoint security company Trusteer
IBM has signed an agreement to acquire security company Trusteer, and plans to set up a cybersecurity software lab in Israel. Read More

What are the next Big Space Life Questions?
Getting NASA's astrobiology community to agree on a set of specific future space life exploration goals must be like herding cats - there are over 500 members, but the group is currently trying to do just that by defining the most important questions it want to focus on for the 2014 Strategic Plan. Read More


WHITE PAPER: Riverbed Technology

Network Monitoring and Troubleshooting for Dummies
The Network Monitoring and Troubleshooting for Dummies Book introduces you to common network performance management (NPM) issues and give you a new way of looking at solving them. This perspective allows you to see your network from your users' point of view, namely, the services and applications they use and their experience with them. Learn More

Encryption news: What you need to know
We probably should have seen this coming, what with government spying dominating headlines for the summer, but encryption suddenly became a hot topic this week. Read More

Cybercriminals use Google Cloud Messaging service to control malware on Android devices
Cybercriminals are controlling malware on Android devices through a Google service that enables developers to send messages to their applications, according to security researchers from antivirus vendor Kaspersky Lab. Read More

USENIX: Researchers propose security that adapts to combat malware that morphs
Attackers launch malware that automatically alters itself to avoid detection, and they constantly create new domains where their command-and-control servers can hide, but researchers have come up with security software that detects the presence of attack code even if it has morphed and tracks down domains that infected client machines report to. Read More


WHITE PAPER: HP and Intel® Xeon® processors

HP StoreOnce Is "Better Together" with HP Data Protector 7
This paper looks at the benefits to be realized in the combined scenario of HP StoreOnce appliances being used with HP's own Data Protector 7 backup software while considering the topic of "where" the deduplication occurs. Learn More

Hackers targeting servers running Apache Struts applications, researchers say
Chinese hackers are using an automated tool to exploit known vulnerabilities in Apache Struts, in order to install backdoors on servers hosting applications developed with the framework. Read More

Cisco cuts 4,000 jobs in restructuring effort
Cisco today said it would slice 4,000 jobs – or 5% of its workforce in a global restricting effort. Shares of the network equipment giant fell nearly 10% after-trading hours. Read More

USENIX: Gamers use DDoS as a service to cheat – a lot
Cheating gamers pay as little as $10 per month to launch denial of service attacks against their opponents as a tactical advantage using commercial providers that walk the line between being legitimate businesses that stress-test their customers' networks and purveyors of DDoS as a service, researchers at USENIX Security 2013 say. Read More

In other news: One second on the 'Net, hacker hopes to hack license plate readers, Gauss gun
Read More


SLIDESHOWS

15 more useful Cisco sites

In our never ending effort to uncover the most useful sites for Cisco users, we've come up with 15 more!

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 10 steps for closing the IT skills gap

2. Why Netflix is one of the most important cloud computing companies

3. Hot IT security companies to watch

4. How to solve Windows 8 crashes in less than a minute

5. Top open source network management tools

6. Chambers: Cisco will become the #1 IT company

7. 11 signs your IT project is doomed

8. How CCP handled the biggest multiplayer gaming battle in history

9. 6 highest & lowest paid IT jobs

10. Bloodiest Tech Industry Layoffs of 2013 (so far)


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: