Friday, October 04, 2013

The Very Mysterious NSA Quiz

Mozilla unmasks security flaw in Persona, warns other OpenID implementers | McAfee research shows sharp rise in malware signed with legitimate digital certificates

Network World Security

Forward this to a Friend >>>


The Very Mysterious NSA Quiz
They know everything about you but what do you know about them? Read More


WHITE PAPER: Dell SecureNetworks

CISO's Guide to Advanced Attackers
No matter the size of your organization, advanced cyber-attacks represent a credible threat to your organization. Security analyst firm Securoris and Dell SecureWorks collaborated on this guide to help gather intelligence, mine for threat indicators, respond to alerts and break the attack process. Read now!

WHITE PAPER: Akamai Technologies, Inc.

Demonstrate the Business Value of Security
This Forrester report highlights the most common mistakes made in the budgeting process and offers Forrester's step-by-step Information Security Value Model to guide you through a strategy to support smart investment and resource allocation. Learn More

Mozilla unmasks security flaw in Persona, warns other OpenID implementers
A vulnerability found recently in an OpenID-based feature of the Mozilla Persona online identity management service prompted the company to advise Web developers to check their OpenID implementations for similar issues. Read More

McAfee research shows sharp rise in malware signed with legitimate digital certificates
McAfee research indicates that a steep rise in the amount of malware signed with legitimate digital certificates — not forged or stolen ones — is a growing threat that raises the question whether there should be some kind of "certificate reputation services" or other method to stop certificate abuse. Read More

Meet the man behind Silk Road, the online drug marketplace the FBI has seized
The FBI arrested the proprietor of Silk Road, the industry-leading online black market for buying and selling drugs, in San Francisco yesterday, according to several reports. Read More


WHITE PAPER: F5 Networks

Gaining Real-Time Protection with IP Perimeter Intelligence
Attack methodologies change. Threat vectors change. Once-powerful defenses become obsolete. As the pace of these changes increases, it's unrealistic to wait for defense methods to catch up, or for new products to be developed and releases pushed out. View Now

Bitcoin forum goes offline after hack
A popular Bitcoin forum, Bitcointalk.org, remained offline Wednesday night as it investigated a cyberattack. Read More

Instagram is wrecking your dinner (and lunch too for that matter)
Seems that all those Instagrammed photos of food are more than just annoying, they could hurt our desire to eat. Read More

5 steps for application security
The software development lifecycle can be a double-edged sword. On one hand, software needs to be developed with usability in mind, and it needs to be produced quickly. On the other hand, it also needs to maintain a solid security base. Having those two sides in equal measure is easier said than done. Darren Meyer, Senior Security Researcher for Veracode, walks us through five steps for secure application development and deployment. Read More


WEBCAST: SAP

Major forces drive requirement for new application platform
Cloud computing, rampant mobility, Big Data, and social business have created challenges never seen before. There is a need for a new application platform. In this webcast, find out about the forces shaping the 'third platform', and why the move to the third platform is the only way to meet customer needs. Learn more

Lawmaker: Snowden may have had help with leaks
Edward Snowden may not have acted alone, and may have had outside assistance, when he leaked information about the U.S. National Security Agency's data collection and surveillance programs earlier this year. Read More

Google adds pix search to Chrome, squashes 50 bugs
Google this week updated Chrome to version 30, patching 50 vulnerabilities and paying outsider researchers $27,000 in bounties along the way. Read More

US demanded access to encryption keys of email provider Lavabit
The U.S. government demanded from email service provider Lavabit access to all user communications and a copy of the encryption keys used to secure web, instant message and email traffic for its investigation into several Lavabit user accounts, according to a post on the Facebook page of founder Ladar Levison. Read More

Dell updates private cloud to become PCI compliant
Looking to solidify its refocused efforts on private cloud platforms, Dell today rolled out new features to improve security and manageability of its offerings. Read More


SLIDESHOWS

iOS 7 tips and tricks you need to learn

Some advice on getting the most out of Apple's new mobile operating system, iOS 7.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Research buries Microsoft's Bing vs. Google claim

2. 15 must-have iOS apps you can't get on any other platform

3. Cisco/Insieme ushering in hardware-defined networks

4. Meet the man behind Silk Road, the online drug marketplace the FBI seized

5. HP says open sourcing SDNs is wrong

6. Former Qwest CEO out of prison, blames NSA for troubles

7. 12 best places to land a tech job

8. McAfee sets sandbox appliance to explode stealthy malware

9. 80% pay raise for Cisco CEO Chambers

10. Ubuntu impresses in Linux enterprise server test


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment