Search This Blog

Friday, January 23, 2009

Obama gets special BlackBerry; Symbian malware takes money from phone; GSM hacking

President will use security-enhanced wireless device
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by AMD
rule

See the power of the new Quad-Core AMD Opteron(TM) processor.
Virtualization is a proven engine that drives business performance. The fusion of the Quad-Core AMD Opteron(TM) processor and virtualization - It's a match made in the data center. Find out more:

rule

Spotlight Story
White House confirms: ObamaBerry is a go

John Cox By John Cox
In today's just-concluded press briefing, the White House has confirmed that President Barack Obama will have the use of a security-enhanced BlackBerry, to correspond with a small group of personal friends and senior staff. Read full story

Related News:

What Obama won't be using: Sectera Edge There was a lot of speculation that President Obama would have his BlackBerry replaced with the Sectera Edge, a secure, rugged Windows Mobile smartphone built by General Dynamics.

Bloggers wonder: Is Obama's BlackBerry super-encrypted? Bloggers are now speculating that President Barack Obama will have access to a BlackBerry wireless device equipped with a super-encryption package, although -- not surprisingly -- no one is sure whether the president actually is using one.

Symbian malware takes money from phone Hackers have discovered a new way to steal your money: texting it out of your phone.

Networking Geek to Geek with Jimmy Ray Purser: GSM hacking - the next big thing I was asked by one of dudes at my monthly hackers meeting if I have been hacking GSM lately. I told them the equipment to monitor 850MHz and 1800MHz to gather enough info is too much for me to expense. He told me, no gear is required to find a hole, just use a pencil.

Heartland breach raises questions about PCI standard's effectiveness While it's not yet known if Heartland Payment Systems' data breach will count as the largest card heist ever, some analysts say what is clear is that the Payment Card Industry (PCI) data security standard isn't sufficient.

Podcast: Heartland hit by massive data breach Heartland Payment Systems, a New Jersey based provider of credit and debit card processing services this week said unknown intruders planted malicious software to steal card data on as many as 100 million accounts sometime last year. Derek Manky, who leads the global threat research team at Fortinet, shares his take on what may be the biggest data fraud scheme of all time. (11:15)

Virtual desktops getting security boost Businesses looking for safer virtual desktops can cut the risk of attacks if they run their virtual-machine hypervisors directly on computer hardware, eliminating reliance on separate operating systems that can be...

Mac Trojan Horse found in pirated Apple iWork '09 Intego, a maker of antivirus and firewall software, has issued an alert to warn Mac users not to download Apple iWork '09 installers from sites offering pirated software.

Clerical error foiled Sumitomo bank hack The largest near heist in banking history failed because the men accused of trying to carry it out didn't properly fill in a single field in an electronic transfer form.

Microsoft Security Response Center gets new boss The point man for security bug fixes at Microsoft has stepped down as director of the Microsoft Security Response Center (MSRC).

Sophos may lay off up to 5% of staff Security vendor Sophos plans to lay off up to 5% of its staff, the company said Thursday.

From fighting toxic chemicals to fixing cyber nfrastructure: The government’s top 10 trials and tribulations Watchdogs at the Government Accounting Office periodically assess the Fed’s most high-risk areas or areas that are prone to fraud, waste, abuse, and mismanagement that can directly impact all of us. On the GAO hit list which was sent to the 111th Congress this week are all manner of issues from repairing the nation’s cyber infrastructure and keeping taxpayer information private to how to effectively move the IRS and financial regulatory systems into the future.

Seagate warns of firmware problem with Barracuda hard drives Seagate has confirmed a potential firmware problem with some of its Barracuda 7200.11 hard drives, along with related Serial ATA (SATA) hard drives based on the same...

Who goes there? Identity management is all about who you are and what you should be allowed to do. This Product Guide describes the technology and how it works.

January giveaways from Cisco Subnet and Microsoft Subnet
Up for grabs: Two Cisco training courses from Skyline-ATS worth up to $6,990, a Microsoft training course from New Horizons worth up to $2,500, 15 copies each of the hot book titles Microsoft SQL Server 2008 Management and Administration, IPv6 Security and Chained Exploits: Advanced Hacking Attacks. Get all the entry details here.


IT Outlook '09
Products of the WeekIn-depth analysis of the latest enterprise strategies, start-ups to watch, people to know, and more.

9 hot technologies for '09
9 hot technologies for '09Our annual rundown, plus a tip or two about how to approach each hot technology.

Sponsored by AMD
rule

See the power of the new Quad-Core AMD Opteron(TM) processor.
Virtualization is a proven engine that drives business performance. The fusion of the Quad-Core AMD Opteron(TM) processor and virtualization - It's a match made in the data center. Find out more:

rule

Take Control of Network TCO by Automating IPAM
Join ESG and Infoblox to learn about reducing network TCO while boosting network availability by automating IPAM.
Review this information-packed webinar today.


Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe in this Executive Guide. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies explained in this report.
Download this Executive Guide now.

 

01/23/09

Today's most-read stories:

  1. Bull castration and snake eaters: the life of Dave Hitz
  2. Apple puts iPhone Nano and Netbook rumors to rest
  3. Blogger: Obama to get 'super-encrypted' BlackBerry
  4. Court rules Kentucky does not own the Internet
  5. How to protect your PC against the Downadup worm
  6. Downadup worm now infects 1 in every 16 PCs
  7. Juniper expected to cut jobs amid weak demand
  8. US-CERT: Microsoft's advice on Downadup is flawed
  9. Nortel chief flying in corporate jet as company files for bankruptcy
  10. Windows 7: the untold story of how the enterprise gets snubbed


The Evolution of Network Security
Zero in on the hottest security technologies you need to know about in this Executive Guide. Better protect your IT environment with NAC, data leakage prevention controls and auditing tools.
Learn more.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: