Search This Blog

Monday, August 04, 2014

Android vulnerability still a threat to many devices nearly two years later

Black Hat shows its quirky side | Microsoft ordered to turn over customer data stored in the cloud

Network World Security

Forward this to a Friend >>>


Android vulnerability still a threat to many devices nearly two years later
Security researchers have recently found a vulnerability that could be used to hijack Android apps and devices, but an older issue that can have the same effect remains a significant threat nearly two years after its discovery, according to security firm Bromium.The issue was reported in December 2012 and concerns an Android API (application programming interface) called addJavascriptInterface that allows applications to expose their native code to Web code running inside a WebView, an instance of Android’s Web browser engine.To read this article in full or to leave a comment, please click here Read More


WEBCAST: Cisco Systems

Evaluating Leading Breach Detection Systems
Today's constantly evolving advanced malware and Advanced Persistent Threats (APTs) can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to confront these advanced threats before, during and after attacks. Learn more >>

WHITE PAPER: Fortinet

NSS Data Center Firewall Test
NSS Labs Product Analysis for Fortinet Data Center Firewall Learn More

Black Hat shows its quirky side
The digital security exploits revealed at Black Hat are always impressive and hard to predict, so the bar is set pretty high for anyone hoping to grab attention at the show outside of the security briefings. That means vendors and individuals try hard to come up with ways they can stand out from the crowd. Here's a look at some of the noteworthy efforts from Black Hat 2013. Read More

Microsoft ordered to turn over customer data stored in the cloud
Federal court says warrant for info stored in Ireland is not an extra-territorial application of U.S law; decision has privacy implications Read More


: AT&T

Developing a Smart Approach to SMAC Security
In this eGuide, CSO and sister publications IDG News Service, Computerworld, and CIO pull together news, trend, and how-to articles about the increasingly difficult task of protecting corporate data. Read on to learn about the issues surrounding data protection today and the strategies you can use to help protect your organization. Learn More

IBM buys access control and identity management firm CrossIdeas
With CrossIdeas, IBM is gaining auditing tools for policing segregation-of-duties violations across disparate systems Read More

Hacker group targets video game companies to steal source code
The group has ties to the Chinese hacker underground and uses custom tools to attack companies, researchers from Dell SecureWorks said Read More


WHITE PAPER: Juniper Networks

Security in the Next-Generation Data Center
This white paper examines these trends, and it reveals the key capabilities that today's security teams require to effectively ensure that vital corporate assets remain secure, while at the same time optimizing access, cost, and administrative efficiency. View Now

No patch yet for zero day in Symantec Endpoint Protection software driver
Symantec has published recommendations for mitigating the danger Read More

Black Hat 2014: How to crack just about everything
From cell phones and cars to IPv6 security researchers have turned their skills against a world of technology Read More

INSIDER
11 signs you've been hacked -- and how to fight back
Redirected Net searches, unexpected installs, rogue mouse pointers: Here's what to do when you've been 0wned Read More


SLIDESHOWS

Black Hat 2014: How to crack just about everything

From cell phones and cars to IPv6 security researchers have turned their skills against a world of technology.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Why TCP/IP is on the way out

2. Linux will not become a gaming platform, it already is one

3. 20 cool things you can do with a Raspberry Pi

4. Some are twisting the facts in requests to be forgotten, Google says

5. Top 20 colleges for computer science majors, based on earning potential

6. The best cities for landing top pay for your tech skills

7. Black Hat 2014: How to crack just about everything

8. Federal court system warns of new e-mail jury scam

9. 10 disturbing attacks at Black Hat USA 2014

10. Half of surveyed US businesses shun SDNs


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: