Tuesday, August 04, 2009

Cisco fixes BGP vulnerabilities in IOS; How to hack a parking meter

Black Hat 2009: How to hack a parking meter; Kevin Mitnick seeks refuge from hackers
Network World logo

Daily News AM Alert

NetworkWorld.com | Update Your Profile


Sponsored by Kaseya
rule

Horror Stories: Managing IT Across Multiple Locations
Increasing demand and shrinking budgets can make systems management across multiple locations a frightening experience. Join us for this important FREE webcast August 18, 2009 and discover how you can efficiently manage hundreds of systems through one interface, saving time, hassle, money and resources.

rule

Spotlight Story
Cisco fixes BGP vulnerabilities in IOS

Cisco last week issued -- and this week updated -- a security advisory for its IOS software. The vulnerability has to do with 4-byte Autonomous System numbers in BGP updates. Read full story

Related News:

Black Hat 2009: How to hack a parking meter
At Black Hat this week, security researchers showed how a technically savvy hacker can make a fake payment card that allows unlimited free parking on San Francisco's smart parking meter system.

Kevin Mitnick seeks refuge from hackers
Kevin Mitnick, the ex-hacker turned security consultant, is such a high-profile target himself that the Web-hosting firm he was using finally told him it wouldn't host Web pages for him anymore.

Is advertising the future of wireless?
The willingness of customers to tolerate advertisements as part of their telecom services has been an issue that telecom carriers have been grappling with lately as they contemplate how to maintain their revenues and avoid being relegated to providing 'dumb pipes' that only connect customers to the Web without offering any value-added services.

Is Your Linksys or Netgear Router Open to Attack?
If you have a Linksys model WRT160N or Netgear RP614v4 router, it may be time to worry a little. At least according to a report out of Defcon from The Register. The vulnerability is based on CSRF, or cross-site request forgery, an issue with the cPanel web-based control software used to administrate the devices.

Cisco expected to hit high end of Q4 guidance
Cisco is expected to report Q4 results at the high-end of guidance provided when it reported its Q3 numbers 3 months ago. Investment firm UBS cites an improving order trend during the quarter, based on its channel checks.

Report: Hathaway resigns as acting cybersecurity czar
Melissa Hathaway, who was regarded as one of the top contenders for the new position of White House cybersecurity coordinator, has withdrawn from consideration and resigned as acting senior director for cyberspace citing personal reasons, the Wall Street Journal reported.

Apple board ends Google's CEO funny business
From the "what-took-you-so-long" category: Today, Apple announced that Google's CEO Eric Schmidt is no longer on Apple's board of directors. This had to happen and probably should have when Google released Android.

Five great giveaways for August
Win Cisco Press Books from Cisco Subnet.

August giveaways: we're giving away SCCM books and free training
Win free Pearson Education books from Microsoft Subnet.

Sam Ramji: Why Microsoft contributed to open source
Sam Ramji, Senior Director of Platform Strategy joins us to talk about Microsoft's recent open source code contribution to Linux.

15-ton bomb would move aside "The Mother" and become "The Father Of All Bombs"
Now this is one big bomb. Published reports today say the Pentagon is rattling swords in the direction of North Korea and Iran by speeding the development a 20-foot, 30,000lb bomb known as Massive Ordnance Penetrator (MOP).

August Giveaways
Cisco Subnet is giving away training from Global Knowledge and 15 copies of Practical Intrusion Analysis; Microsoft Subnet is giving away training from Global Knowledge and 15 copies of SCCM 2007 Unleashed. Google Subnet is giving away 15 copies of Web Geek's Guide to Google Chrome. Entry forms can be found on the Cisco Subnet, Microsoft Subnet and Google Subnet home pages. Deadline for entries is August 31.

Network World on Twitter? You bet we are


Black Hat's best
Black HatHow well you remember the Black Hat conference's most notorious incidents?

Wireless burning questions
IT quizHow much longer are you going to hang onto that Ethernet cable? And other questions.

IDC: Realizing the Benefits of Deduplication
Many organizations are grappling with rapidly growing storage requirements. IDC has found that those organizations are experiencing 50% growth in data, adding as much as 4TB of data each year.
IDC: Realizing the Benefits of Deduplication




 

August 04, 2009

TOP STORIES | MOST DUGG STORIES

  1. Fake ATM doesn't last long at hacker meet
  2. Have you hugged your SysAdmin today?
  3. Defense Department eyes hacker con for new recruits
  4. Some IT skills hot, even in down economy
  5. Nine things about botnets that will scare your pants off
  6. CEOs still getting big perks despite pay backlash
  7. Korean 'journalists' booted from Defcon
  8. 'I now pronounce you monetized'
  9. When error messages go public
  10. Why I built a Ubuntu PC out of an old carpet cleaner

Effectively Supporting Consumer-Owned Smartphones
Resolve Smartphone downtime incidents quickly by sharpening your approach to mobile device management. In this whitepaper Osterman Research clearly explains which Smartphones are being used, how IT shops are managing these devices and how the heterogeneous nature of the market is causing more complexity for IT professionals.
Learn More



IT Buyers guide

 


This email was sent to networking.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment