Friday, August 24, 2012

Microsoft warns of 'man-in-the-middle' VPN password hack

Dumbest & craziest sports technology moments of 2012 | New BIOS security standards aimed at fighting rootkit attacks

Network World Compliance

Forward this to a Friend >>>


Microsoft warns of 'man-in-the-middle' VPN password hack
Microsoft yesterday warned Windows users of possible "man-in-the-middle" attacks able to steal passwords for some wireless networks and VPNs, or virtual private networks. Read More


WHITE PAPER: Teradata

Solid State Storage for Data Warehousing
Industry analyst Richard Winter's executive report explains the advantages of SSDs in data warehousing: How balancing the fast data access of SSDs with the efficient storage of HDDs perfectly fits Teradata's high-performance approach to data warehousing, analytics and BI. Learn more.

In this Issue


WHITE PAPER: Good Technology

Data Loss Prevention Whitepaper: When MDM Isn't Enough
This paper explores common methods of data loss that cannot be prevented through MDM alone. In addition, this paper will introduce Good for Enterprise and its unique approach to managing security on mobile devices, which does address some of the shortcomings of an MDM-only strategy Learn More Now!

Dumbest & craziest sports technology moments of 2012
From phony websites to regrettable tweets to Apple Siri chatter, it's clear athletes and technology often don't mix well Read More

New BIOS security standards aimed at fighting rootkit attacks
There's a growing threat of attacks on computer basic input/output system (BIOS) firmware, and to deter it, the National Institute of Standards and Technology (NIST) is putting in place new security guidelines for updating the BIOS. And in doing this, NIST is getting high-tech manufacturing to raise the bar on security. Read More

After a hack: The process of restoring once-lost data
Mat Honan, a reporter with Wired magazine, thought almost his entire digital life had been lost, but a team of recovery engineers were able to restore most of it by diving deep into his compromised laptop. Here's how they did it. Read More

Products of the week 8.20.12
Our roundup of intriguing new products Read More

Building your first desktop PC
I've long been curious about the process of building a computer from scratch, and, a couple of weeks ago, I finally took the plunge. While I was expecting a tortuous and highly technical process, the actual experience was far less painful. Read More


WHITE PAPER: Array Networks

Secure Your Business.
Employees want to work anytime, anywhere, often from personal and mobile devices. See what Frost & Sullivan has to say about the risk of relying on VPNs and learn about zero-trust models that keep devices "off-network" and prevent data from leaving the network. Learn more.

60-minute security makeover: Prevent your own 'epic hack'
Here are some ways to beef up security on your digital life -- before someone seeking to duplicate the hack that seized control of a Wired reporter's Apple, Amazon and Google accounts finds similar vulnerabilities in yours. Read More

Siemens works to fix vulnerability in critical control networks
Siemens is working to fix a remotely exploitable vulnerability in network routers and switches from subsidiary RuggedCom that are widely deployed in refineries, power substations and other critical infrastructure networks in the U.S. Read More

Mobile-security firm Mocana gets $25 million in new funding
Mocana Thursday disclosed it has received $25 million in new venture capital funding led by Trident Capital, which sees the startup as a potentially major player in mobile security. Read More

Technology's Dark Side: Devious Devices Designed to Harm You
We're accustomed to the idea of hackers trying to crack our computers, but today our TVs, cars, phones, and appliances are becoming increasingly vulnerable as we use technologies such as Wi-Fi, Bluetooth, RFID, cellular, and GPS to connect them. Read More

Obama and Romney election apps suck up personal data, research finds
Millions of US voters could be downloading smartphone apps created to promote the campaigns of President Obama and his Republican election rival Mitt Romney without noticing the intrusive permissions demanded by the software, GFI Software has reported. Read More


WHITE PAPER: F5

Application Delivery Optimization
Fueled by users who are hyper-sensitive to delays in application delivery, organizations are striving to improve performance by optimizing delivery. Learn how to achieve that goal without sacrificing the agility of modern data center architectures. Learn More!

Top tablets for back to work and back to school
As the days of summer wane, thoughts turn to getting things done. Here are the tablets that get things done Read More

Cloud provider: The best security for your passwords is to never give it to us
Ethan Oberman, CEO of cloud backup and sharing service SpiderOak, has a proposition for enterprises that may be leery about using the cloud because of a perceived lack of security. The best security for cloud storage, he says, is to encrypt the data and not give your service provider the keys to unencrypt it. Read More

Want security, privacy? Turn off that smartphone, tablet GPS
People with smartphones and tablets may be giving Apple and Android apps they download the permission to capture their geolocation data to know where they are, but security experts are making the strong argument to just say no instead -- and turn off that GPS function unless really needed. Read More

Pirated mobile Android and Apple apps getting hacked, cracked and smacked
Those popular mobile apps that everyone's buying from the official Android and Apple apps stores for business and fun are being torn apart by hackers who turn around and post these abused apps filled with malware, their content pirated or otherwise tampered, according to a study out today. Read More

General Dynamics buying Fidelis Security for DLP expertise
General Dynamics Monday announced plans to acquire Fidelis Security Systems for an undisclosed amount in an effort to bolster the former's expertise in data-loss prevention (DLP) technologies. Read More



SLIDESHOWS

9 ex-Googlers on the move
Former Google employees continue to make their mark on the tech world.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Home Wi-Fi routers could operate as emergency network, say scientists
  2. Microsoft removes Windows 8 grace period, inconveniences everybody
  3. After a hack: The process of restoring once-lost data
  4. With iPhone 5 on the way, iPhone 4 & 4S deals spring up
  5. Move over Segway: Introducing the Hover Bike
  6. Microsoft warns of 'man-in-the-middle' VPN password hack
  7. Want security, privacy? Turn off that smartphone, tablet GPS
  8. Are all the .coms really all .gone?
  9. New BIOS security standards aimed at fighting rootkit attacks
  10. McAfee antivirus update causes problems for home and enterprise customers

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: