Search This Blog

Thursday, July 30, 2009

More holes found in SSL; Slideshow: Error messages in public places

News podcast: Network World 360; Slideshow: Error messages in public places
Network World logo

Daily News PM Alert

NetworkWorld.com | Update Your Profile


Sponsored by Kace
rule

Systems Management Success In Healthcare
The pressure on the healthcare industry to reduce costs, adhere to government regulations such as HIPAA, and raise the quality of services, all with a limited IT budget, are daunting. Register today to hear how Steve Coryell, Network administrator at Island Hospital leveraged a breakthrough appliance-based approach to systems management to save his team precious time and his organization money.

rule

Spotlight Story
More holes found in Web's SSL security protocol

Security researchers have found some serious flaws in software that uses the SSL (Secure Sockets Layer) encryption protocol used to secure communications on the Internet. Read full story

Related News:

News podcast: Network World 360
Spam now constitutes 92 percent of all e-mail, according to McAfee's latest threat reports. MX Logic sees that figure as even higher – it says a whopping 94.6 percent of all e-mail sent is spam, which is often linked to phishing attacks or fraud. Also, a new survey from Gartner says that companies that neglect their IT workforce because of recession-related staff cuts could hurt the companies in the long term. (5:36)

Slideshow: Error messages in public places
It's bad enough when the error messages pop up on your PC's monitor in the privacy of your own home. But with so many public displays -- many of them quite prominent -- driven by consumer-grade hardware, sometimes these dialog boxes can show their faces in the most awkward of situations.

HP researchers say browser-based 'Veiled' make darknets a snap
Darknets – private networks carved out of the Internet to allow peer-to-peer sharing – can be quickly and easily created among Web browsers making it possible for people to participate anonymously and for the darknet itself to vanish with barely a trace when all the participants close their browsers, researchers told Black Hat yesterday.

Ballmer surprised by market's reaction to Microsoft-Yahoo
Microsoft CEO Steve Ballmer was surprised that Wall Street reacted negatively to Yahoo's plan to hand over its Internet search and advertising reins to Microsoft, he said Thursday.

Microhoo allows economies of scale? Ho-hum
By now, we've all heard: nearly a year and a half to the day Microsoft first tried to take Yahoo to bed, the pair have finally completed their prenup negotiations and gotten hitched.

Top 10 iPhone Annoyances (And How to Fix Them)
Even the greatest gadgets have flaws, and the iPhone is certainly no exception. Praise it all you want, but the "Jesus phone" has plenty of little annoyances or nuisances that get under a user's skin. Fortunately, technology is all about workarounds to common problems. So we've not only put together a Top 10 list of iPhone annoyances to vent about, we're also offering solutions.

Open-source project aims to makes secure DNS easier
A group of developers has released open-source software that gives administrators a hand in making the Internet's addressing system less vulnerable to hackers.

Five questions financial analysts should be asking Microsoft
On Thursday Microsoft will reveal its annual earnings via its full-disclosure filing with the SEC (the 10K) and its annual financial analyst meeting. Microsoft last week announced its earnings -- (via an 8K filing) and the news was not good, a 29% dive in profit. We can only hope that its past two painful quarters will serve as a wake up call.

Greenpeace Slaps HP in the Headquarters
Throughout this entire week, I have noticed the same story appearing over and over again in most "green" related news channels as well as many mainstream media distributions as well. The story is about HP and their failure to keep promises regarding their environmental policies.

The Hidden Cost of Out-of-Cycle Security Patches
This week we all had to deal with the emergency Microsoft security patches due to a critical exposure in the Active Template Library (templates used for COM+ development) that could result in local code execution by a hacker.

Man Scales Wall With DIY Spiderman Gloves
UK TV presenter and inventor Jem Stansfield has recently used his very own vacuum powered invention to scale a London building.

Defense stalwarts building cybersecurity CSI
Northrop Grumman has become the latest defense contractor to go whole hog into cyber threat monitoring and detection. The defense giant said it has opened cyber threat detection and response center staffed around-the-clock, providing security monitoring for more than 105,000 clients and 10,000 servers worldwide.

Cloud-based identity services taking on a different look as they grow
Cloud-based identity services are starting to gain a foothold among corporate users, but the evolving architecture looks nothing like the platforms companies have been building internally, according to Bob Blakley, vice president and research director at the Burton Group.

July Giveaways
Cisco Subnet is giving away 15 copies each of books on Enterprise Web 2.0 and Building a Greener Data Center; Microsoft Subnet is giving away training from New Horizons to one lucky reader and 15 copies of Microsoft SQL Server 2008 Reporting Services Unleashed. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages. Deadline for entries July 31.

Network World on Twitter? You bet we are


Botnet boom
BotnetsThe number of botnets has grown from about 1,500 two years ago to 3,500 today.

Watch this space
IT quizHere are 11 security companies to watch.

Unified Communications Information Kit
Get the inside track on advanced communications and collaboration solutions from IBM with our complimentary Information Kit. Learn how to reduce your communication costs, consolidate servers, boost productivity and increase your competitive advantage.
Learn More


 

July 30, 2009

TOP STORIES | MOST DUGG STORIES

  1. iPhone SMS attack to be unleashed at Black Hat
  2. Mystery solved: MS emergency patch precedes Black Hat session
  3. Clampi Trojan plunders financials for botnet
  4. CERT and ISC warn about BIND9 DNS vulnerability
  5. 5 technologies Iran is using to censor the Web
  6. Microsoft-Yahoo will change cloud computing
  7. Cloud computing confusion reigns in U.S. government
  8. Black Hat's most notorious incidents
  9. What business is Cisco in today?
  10. Cisco fixes critical WLAN flaws

Examining Netcordia's NetMRI 3.0
Sick of the spreadsheet? Download this whitepaper today and examine Netcordia's NetMRI 3.0, a user-centric upgrade to its network change and configuration management (NCCM) solution. IT research firm Enterprise Management Associates reports that NetMRI 3.0 "propels NCCM practices to new levels."
Examining Netcordia's NetMRI 3.0



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: