Friday, January 28, 2011

Hackers turn back the clock with Telnet attacks

12 geekiest snow and ice sculptures | Security stud Kaminsky's smartphone app a blessing for colorblind

Network World Compliance

Forward this to a Friend >>>


Hackers turn back the clock with Telnet attacks
A new report from Akamai Technologies shows that hackers appear to be increasingly using the Telnet remote access protocol to attack corporate servers over mobile networks. Read More


WEBCAST: Riverbed

Accelerating Your Virtual Environment with WAN Optimization
Which applications in your virtual environment do you want to accelerate the most? This Webcast surveys the applications that suffer the most from latency and discusses the 3 root causes of poor wide-area application performance. See how you can realize dramatic improvements in replication in virtual machines. Learn More!

WHITE PAPER: Siemens

Finding the Value in Unified Communications
This paper examines the four stages of return companies can see from their UC investments: Lower communications costs are followed by lower operational costs, then better productivity, and finally a true competitive advantage. Read More

12 geekiest snow and ice sculptures
When the going gets cold, the Linux, Mac, Star Wars and other geeks get creative Read More

Security stud Kaminsky's smartphone app a blessing for colorblind
Dan Kaminsky was pretty quiet last week considering there was a Black Hat security conference in DC, but maybe that's because his latest revelation isn't about IT security. It's about enabling the colorblind to recognize the difference between colors such as red, green and brown. Read More

Facebook blames Zuckerberg embarrassment on API 'bug'
CEO wasn't the only one whose page saw unauthorized posts Facebook is blaming Tuesday night's embarrassing defacement of CEO Mark Zuckerberg's Facebook fan page on an API "bug" that allowed unauthorized persons to post not only on his page but those of an undisclosed number of other users. Facebook claims the problem has been rectified. Read More


WHITE PAPER: Radware

ADC-VX: Industry-First ADC Virtualization Hypervisor
ADC-VX™, the industry's first Application Delivery Controller (ADC) Hypervisor, runs multiple virtual ADC instances on dedicated hardware, Radware's OnDemand Switch platforms. ADC-VX is designed from the ground up to provide companies with, "The Agility of Virtual; The Predictability of Physical". Learn More

Smart cards no match for online spies
The U.S. government has been stepping up its use of smart cards to help lock down its computer networks, but hackers have found ways around them. Read More

CloudPassage aims to ease cloud server security management
Security firm CloudPassage, in stealth mode until today, hopes to build itself a market by helping enterprises reign in firewall and system configuration of cloud servers. Read More

Expert: WikiLeaks complicates compliance
SenSage CEO Joe Gottlieb explains how WikiLeaks was just the beginning of a larger challenge to come, in terms of compliance efforts and a future full of WikiLeaks-inspired content leakers. Read More


WHITE PAPER: Tripwire

Next Generation Log and Event Management
Managing event logs was once seen as a job to be avoided, but IT compliance regulations have made it a necessary practice. Now, IT and security managers are also discovering the value embedded in those logs to help them improve their organizations' security. Read More!

Products of the Week
Our round-up of intriguing new products from MokaFive, Blue Coat, Cisco, among others. Read More

Q&A: How biometric data can secure your Android smartphone
If your phone's lock screen leaves you feeling a little insecure, you might soon be able to supersede it with biometric security controls. Read More

Intel developing security 'game-changer'
Intel CTO Justin Rattner said on Tuesday that the company's scientists are working on technology that will stop all zero-day attacks. Read More

Forrester's 2011 security strategy recommendations
Every New Year brings an opportunity to review existing security plans and adjust strategies for the next year. And, as I participate in these conversations for 2011, a lot of similar themes have popped up. Most CISOs are struggling with the same issues, ranging from dealing with the changing threat landscape to properly supporting the rising adoption of social technologies, employee-owned mobile devices, and cloud services. In fact, Forrester's research shows that a majority of challenges for security professionals all relate to business orientation and alignment. For example, many senior business and IT leaders are asking CISOs to better support and align with the business and IT objectives, requesting regular interactions and updates from security teams. Read More

Low-cost SSL proxy could bring cheaper, faster security; defeat threats like Firesheep
Researchers have found a cheaper, faster way to process SSL/TLS with off-the-shelf hardware, a development that could let more Web sites shut down cyber threats posed by the likes of the Firesheep hijacking tool. Read More



BECOME AN INSIDER
Get premium content, in-depth reviews, practical tips and exclusive research. All for just signing up. Sign up for free today.

SLIDESHOWS

Panic time quiz: How prepared are you for IPv6?
With IPv4 addresses projected to dry up this year, it's inevitable that IPv6 adoption will accelerate. Here are a few questions that can help determine how much or how little you know about IPv6 and whether you ought to spend more time studying it.

The Mac App Store's hottest productivity apps
The Mac App Store debuted this month and hit 1 million downloads in the first 24 hours. The App Store launched with 1,000 or so apps, many of which were already available on the pre-existing Mac downloads Web site. The store is filled with stuff that's fun but also has plenty of apps that make you more productive. Let's take a look at the 10 most downloaded free productivity apps on the Mac App Store, and then we'll look at the 10 most popular paid productivity apps.

MOST-READ STORIES

  1. Hackers turn back the clock with Telnet attacks
  2. Woman caught smuggling 44 iPhones into Israel
  3. Puppy cams threaten Internet
  4. Facebook unveils security tools after Zuckerberg's page hacked
  5. Inventors of Unix win prestigious Japan Prize
  6. Cisco acquires Pari: What goes around, comes around
  7. Facebook blames Zuckerberg embarrassment on API 'bug'
  8. Intel developing security 'game-changer'
  9. Gartner slams Cisco's single-vendor network vision
  10. Google previews tablet-optimized Android 3.0

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment