Wednesday 21 September 2011

Microsoft fixes SSL 'kill switch' blooper

Terrorism with your pancakes? FBI, DHS, Police Raid 7 IHOP Restaurants | FTC takes aim at facial recognition security; privacy issues

Network World Security

Forward this to a Friend >>>


Microsoft fixes SSL 'kill switch' blooper
Microsoft re-released an update today for Windows XP to correct a snafu that left users vulnerable to potential "man-in-the-middle" attacks for most of last week. Read More


WHITE PAPER: GFI Software

Why Customers Love VIPRE Business
Selecting an antivirus solution for your organization is an important decision. VIPRE Antivirus Business is a high-performance solution that delivers fast, memory-efficient endpoint security with all the necessary functionality you need and nothing you don't — ensuring an optimal end user performance experience. Read now!

RESOURCE COMPLIMENTS OF: Citrix Systems

Scale capacity on demand? Not with F5.
The Iron Age is officially over. The Cloud Age is here. Shift to Citrix NetScaler. 5x capacity on-demand. No new hardware. Shift up to the cloud. Get investment protection and elasticity for your network with NetScaler Pay-as-You-Grow. Simple, software-based licensing. The capacity you need, when you need it. Click to continue

Terrorism with your pancakes? FBI, DHS, Police Raid 7 IHOP Restaurants
Well, well, well, there was some scattered excitement and murmurings of possible terrorist investigations as the feds were busy raiding seven IHOP restaurants across Ohio and Indiana on Tuesday morning. It took about an hour and a half to arrive at the IHOP Evansville scene were the FBI was working as the lead agency with assistance from agents from Homeland Security's Immigration and Customs Enforcement... Read More

FTC takes aim at facial recognition security; privacy issues
The Federal Trade Commission the week said it will hold a workshop that examines how burgeoning use of facial recognition technology impacts privacy and security. Read More

Coping with HIPAA regulations: Electronic faxes
The Health Insurance Portability and Accountability Act mandates reasonable safeguards in communicating patient medical data from one care-provider to another. In this second of two columns on the subject, we look at alternatives to using the old-fashioned fax machines that can accidentally transmit private data to an unexpected recipient. Read More


WEBCAST: IBM

Trends in Business Analytics
In his presentation "Trends in Business Analytics", Colin White (Founder, BI Research) will explore the impact that trends such as analytic RDBMSes, Hadoop and MapReduce, the NoSQL movement, smarter and real-time analytics, and self-service business intelligence will have on businesses. Read Now

Next-gen boot spec could forever lock Linux off Windows 8 PCs
Windows 8 PCs will boot super fast in part because of the next-generation booting specification known as Unified Extensible Firmware Interface (UEFI). The latest UEFI, released April 8, includes a secure boot protocol which will be required for Windows 8 clients. Secure UEFI is intended to thwart rootkit infections by requiring keys before allowing executables or drivers to be loaded onto the device.... Read More

NASA unbolts open source space applications challenge
NASA today said it would host an open source-based application competition that it hopes will deliver a new generation of software that can address space, weather and economic issues. NASA said it will coordinate with other interested space agencies around the world on an International Space Apps Challenge that will encourage scientists and concerned citizens from all seven continents - and in... Read More

DigiNotar certificate authority goes bankrupt
The theft of SSL certificates from Dutch certificate authority DigiNotar so undermined trust in the company that it has gone bankrupt. Read More


WHITE PAPER: Oracle

Architectural Strategies for Cloud Computing
Opportunities for improving IT efficiency and performance through centralization of resources have increased dramatically in the last few years with the maturation of technologies such as SOA, virtualization, grid computing, and management automation. Read now!

Internet privacy: Cookies as a weapon
In November 2009 the European Parliament approved a directive on Internet privacy that, among other things, required user opt-in before websites could install cookies on the user's computer. Read More

Survey: Consumers cynical about how organizations protect data
A few weeks ago we examined some results from a survey ("Who's stealing your data?") commissioned by SailPoint. This week they've released more results from that effort focusing on financial institutions, retailers and healthcare organizations and the cynicism consumers express about how these organizations are protecting their data. Read More

China denies role in hack of Japanese defense contractor
A Chinese government official today denied any involvement in the attack that compromised scores of servers belonging to Mitsubishi Heavy Industries, Japan's largest defense contractor. Read More

5 secrets to building a great security team
For a security industry leader, Tim Williams is a pretty modest guy. As the former head of ASIS International and now as global security director for the $42.5 billion construction equipment manufacturer Caterpillar, Williams has won his share of recognition, which he doesn't take lightly. Read More



SLIDESHOWS

16 essential Android apps for IT pros
There are hundreds of thousands of Android apps, including many that are useful for IT professionals on the job. These apps can help connect to servers, monitor computers, access databases, analyze the airwaves, scan networks, and serve as a reference. Here are 16 of these apps, most of them free.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center and Microsoft training of the winner's choice from Webucator.. Enter here.Also: Please take our survey on certifications and your career

MOST-READ STORIES

  1. Google preps developers for one-size-fits-all Android update
  2. 16 essential Android apps for IT pros
  3. Clarke says smartphones, digital certificates create huge security pr
  4. 5 priorities for HP in data center switching
  5. Has Google's CEO stopped using Google+?
  6. Gmail threatens Microsoft in enterprises, says Gartner
  7. 15 essential open source tools for Windows admins
  8. Blue Screen of Death gets new look in Windows 8
  9. Google Wallet goes live
  10. 5 secrets to building a great security team

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as lisab509.pcnews@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment