Saturday 13 August 2011

10 scariest hacks from Black Hat and Defcon

Facebook security practices questioned in wake of Anonymous threat | Remote Workers: An Easy Target for APTs

Network World Security

Forward this to a Friend >>>


10 scariest hacks from Black Hat and Defcon
Researchers showed all manner of serious attacks on everything from browsers to automobiles. Read More


WHITE PAPER: GFI Software

Why Customers Love VIPRE Business
Selecting an antivirus solution for your organization is an important decision. VIPRE Antivirus Business is a high-performance solution that delivers fast, memory-efficient endpoint security with all the necessary functionality you need and nothing you don't — ensuring an optimal end user performance experience. Read now!

WHITE PAPER: Riverbed

Streamlined Data Protection
One of the greatest challenges today is effectively backing up and protecting the vast amounts of data stored throughout an organization. With WAN optimization, you can accelerate network-based backup by 5x and can reduce bandwidth use by up to 95%. Download this paper and learn more about this strategy today. Learn More

Facebook security practices questioned in wake of Anonymous threat
Even as the shadowy hacker group Anonymous threatens to take on the mighty social-networking site Facebook, claiming the group will 'kill' Facebook on Nov. 5, some researchers are criticizing Facebook security, saying it could be better. Read More

Remote Workers: An Easy Target for APTs
After Black Hat, DefCon, and the recent McAfee report, you are probably tired of all of the hype around APTs. I agree that the industry has co-opted and obfuscated but these "low-and-slow" attacks are something we need to understand and address before more of our private information and intellectual property flies out the IP-connected door. Read More

NuCaptcha Improves Integration of CAPTCHA System
A company that makes a security product designed to thwart problems such as comment spam has added new security and customization features for website owners. Read More


WHITE PAPER: CA Technologies

Application Delivery 2.0 Handbook
This comprehensive handbook offers guidance on ensuring application delivery with a systematic approach. Read More

Encrypting Data in the Cloud Brings Win for Texas
For his work on the foundations of a new way of encrypting data, Brent Waters from the University of Texas in Austin has been elected as one of this year's Microsoft Research Faculty Fellows. Read More

Deja-vu: DARPA's Mach 20 Falcon dives into ocean after nine-minute flight
The second test of the Defense Advanced Research Projects Agency Falcon Hypersonic Technology Vehicle 2 (HTV-2) ended in the same fashion it predecessor did, crashing into the Pacific Ocean nine minutes into its flight. Read More

Researcher Teaches Computers to Detect Spam More Accurately
Without spam detection many of us would spend hours managing the daily load of e-mails. Nina Balcan develops machine learning methods that could be used to develop personalized automatic programs for deciding whether an e-mail is spam or not. For her efforts, the computer scientist from the Georgia Institute of Technology has just been awarded with a Microsoft Research Faculty Fellowship. Read More


WHITE PAPER: Emerson Network Power

Ten Steps to Increasing Data Center Efficiency
You can't manage what you don't monitor. That's why infrastructure monitoring is essential to data center optimization. Emerson Network Power outlines what you should be monitoring, how to monitor it and the results you can expect. Take the proactive approach to infrastructure monitoring. Read now

Microsoft Patches Final Pwn2Own IE Bug
Microsoft on Tuesday patched the last vulnerability in IE that was used by a researcher in March to win $15,000 at the annual Pwn2Own hacking contest. Read More

Heartland unveils mobile-payment device for Android
Heartland Payment Systems today unveiled a mobile-payment device for merchants called "Mobuyle" that works with any Android phone or tablet to handle customer card payments. Read More

10 cloud management companies to watch
Managing the cloud is a tricky endeavor. Here are 10 tools and services that can help Read More

Prosecutor Charges Two in 2010 Sale of IPhone 4 Prototype
A California county district attorney's office has decided not to press charges against Gizmodo or former editor Jason Chen for the blog's part in a 2010 case involving a lost Apple iPhone 4 prototype. Read More



GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

SLIDESHOWS

4 reasons Windows Phone 7 will eventually beat iPhone and Android
Here are four reasons why Microsoft will be a major smartphone player in a few years. And three reasons it won't.

MOST-READ STORIES

  1. IBM says PC going way of vacuum tube and typewriter
  2. Facebook security practices questioned after Anonymous threat
  3. Hosted productivity suites: Google Apps or Microsoft Office 365?
  4. DARPA set to blast Falcon Mach 20 test flight
  5. Steer your career to the cloud
  6. How is the Cisco 76% off Nexus sale going over with customers?
  7. 10 scariest hacks from Black Hat and Defcon
  8. Microsoft makes more money on cloud-based Exchange than legacy email
  9. Did Google+ ban cleavage-snuggling LEGO stormtrooper?
  10. 10 cloud career skills

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as lisab509.pcnews@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment