Friday, April 25, 2014

Black Hat: Top 20 hack-attack tools

How F5 Networks countered the Heartbleed bug | 10 scariest hacks from Black Hat and Defcon

Network World Security

Forward this to a Friend >>>


Black Hat: Top 20 hack-attack tools
Turn someone else's phone into an audio/video bug. Check. Use Dropbox as a backdoor into corporate networks. Check. Suck information out of pacemakers. Check. The Black Hat conference in Las Vegas last year offered hacker tools for all of those plus more. Read More


WHITE PAPER: Spirent

Hardware Test is the Key to Accurate Network Testing
Surprisingly, many organizations are not adequately testing their networks. Network testing is crucial for any IT organization that wants to ensure availability, security and performance of applications and services running on their networks. Learn More

WHITE PAPER: Dell Software

Protect your organization while supporting mobility and BYOD
Check out this new white paper to learn how Dell Mobility Solutions for security can help protect your organization's information, systems and networks while simplifying administration and supporting employees with forward-thinking mobility initiatives for a range of devices and operating systems. Learn more

How F5 Networks countered the Heartbleed bug
Over the last few weeks, the security industry has been rocked by the Heartbleed bug, which impacted OpenSSL-based websites. Heartbleed takes advantage of an OpenSSL feature called heartbeat, which exchanges data between the user's computer and the webserver. Heartbleed causes the web server to send back a massive amount of data, rather than only the data it's supposed to, including sensitive,... Read More

10 scariest hacks from Black Hat and Defcon
During the Black Hat and Defcon conferences researchers tend to wheel out their best new attacks on everything from browsers to automobiles, demonstrating ingenuity and diligence in circumventing security efforts or in some cases in exploiting systems that were built without security in mind. Here's a handful of the ones that over time have deserved the most concern. Read More


WHITE PAPER: Alert Logic and PEER 1 Hosting

Defense Throughout the Vulnerability Life Cycle
This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle. Learn More

Tip of the Hat: Heartbleed prompts chastened tech giants to fund OpenSSL
Computerworld offers a Tip of the Hat to Jon Brodkin of Ars Technica for an incisive look at how only a potential disaster could convince top tech execs to finally help fund the OpenSSL and other open-source projects. Read More

'Francophoned' cybertheft operation reportedly back in action
A cybercriminal operation that combines phone-based social engineering attacks with spear phishing and malware to steal money from organizations has resurfaced this year, finding victims in French-speaking countries in particular. Read More


WHITE PAPER: Sophos, Inc.

Advanced Persistent Threats: Detection and Protection
In this paper we'll explain how a multi-faceted approach to protect against APTs including layers of defense can reduce the risk of attacks. Learn More

Security vendor blames Amazon for customer malware
A security vendor claims Amazon Web Services provided a cloud-computing customer with an unpatched version of Windows that resulted in a malware infection. Read More

Netgear patch said to leave backdoor problem in router
The security researcher who identified an admin backdoor in a range of routers last year has found that Netgear's patches don't adequately address the security issue. Read More

Activism's slippery slope: Anonymous targets children's hospital
Supporters of the faceless collective known as Anonymous have taken up the cause of a young girl, after the State of Massachusetts removed her from her parents earlier this year. However, the methods used to show support may have unintended consequences, which could impact patient care. Read More


SLIDESHOWS

10 Big Data startups to watch

These 10 startups to watch were chosen based on third-party validation, experience, and market potential.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Whatever happened to the IPv4 address crisis?

2. California bill proposes mandatory kill-switch on phones and tablets in 2015

3. ATM malware, controlled by a text message, spews cash

4. 16 weirdest places you'll find Linux

5. 28 facts about pi that you probably didn't know

6. 12 free cloud storage options

7. Top 20 colleges for computer science majors, based on earning potential

8. 8 free Wi-Fi stumbling and surveying tools

9. IRS misses XP deadline, pays Microsoft millions for patches

10. How to change Windows 8.1 to local account with no Microsoft email account required


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment