Search This Blog

Friday, January 28, 2011

Half of federal Web sites fail DNS security test

White House outlines ambitious plan to get 1M electric cars on road by 2015 | iPhone-as-wallet: What you should know before taking the plunge

Network World Security

Forward this to a Friend >>>


Half of federal Web sites fail DNS security test
Half of U.S. government Web sites are vulnerable to commonplace DNS attacks because they haven't deployed a new authentication mechanism that was mandated in 2008, a new study shows. Read More


WHITE PAPER: PacketMotion

PacketSentry Virtual Segmentation
While firewalls are a widely accepted technology for the Internet perimeter, when deployed internally for PCI scope segmentation they have significant deficiencies. This white paper outlines the issues faced with leveraging firewalls for internal network segmentation, and how PacketSentry bypasses these issues with a unique out of band approach. Read now!

WHITE PAPER: F5 Networks

Securing Web Presence with DNSSEC
This article discusses DNSSEC , a series of DNS protocol extensions which ensure the integrity of data returned by domain name lookups by incorporating a chain of trust into the DNS hierarchy. Read now!

White House outlines ambitious plan to get 1M electric cars on road by 2015
Rebates, investments, rewards all part of plan to bolster clean-fueled autosThe White House has outlined a wide-ranging plan of putting 1 million what it calls  advanced technology vehicles on the road by 2015. Most observers would say that is a good start, but is it reasonably doable? Read More

iPhone-as-wallet: What you should know before taking the plunge
A lot of people are skeptical about using their iPhone as a wallet, but let's say you're game for it. What should you do to prepare? Read More

Air Force wants cryptographic security for iPhones, Android
The US Air Force is trying to decide whether or not to use commercial off-the-shelf (COTS) smart phones, such as Android-based devices or iPhones, and how it can securely process classified voice and data using them. Read More


WHITE PAPER: Extreme Networks

XNV Brings Virtual Lifecycle Management to the Network
Extreme Networks ® delivers a network-based, dynamic data center virtualization lifecycle management solution that delivers unprecedented visibility, control and automation of Virtual Machines (VM) to the network administrator. Read now!

Hackers turn back the clock with Telnet attacks
A new report from Akamai Technologies shows that hackers appear to be increasingly using the Telnet remote access protocol to attack corporate servers over mobile networks. Read More

Facebook blames Zuckerberg embarrassment on API 'bug'
CEO wasn't the only one whose page saw unauthorized posts Facebook is blaming Tuesday night's embarrassing defacement of CEO Mark Zuckerberg's Facebook fan page on an API "bug" that allowed unauthorized persons to post not only on his page but those of an undisclosed number of other users. Facebook claims the problem has been rectified. Read More

UK police arrest five Anonymous WikiLeaks defenders
UK police arrested three teenagers and two other people on Thursday for allegedly taking part in a series of denial-of-service attacks against major websites earlier this year as part of the loosely affiliated group "Anonymous." Read More


WHITE PAPER: Diskeeper

Maximize SAN Infrastructure Performance
Although SAN has advantages in performance, reliability, availability and provisioning, it is affected by fragmentation and performance will decline unless it is addressed. Find out why this is true and how to best avoid SAN slowdowns. Read more

FTC wants you to help it outwit telephony crammers
The Federal Trade Commission today said it will host a forum to gather the latest ideas on how to stop unauthorized charges on phone bills known as cramming. Read More

Stuxnet could have caused "new Chernobyl," Russian ambassador says
The Stuxnet worm attack known to have struck computers at the Russian-built Iranian Bushehr nuclear plant in Iran has serious implications and could have caused "another Chernobyl," a Russian ambassador is said to have advised NATO yesterday, according to a Reuters report. Read More

Smart cards no match for online spies
The U.S. government has been stepping up its use of smart cards to help lock down its computer networks, but hackers have found ways around them. Read More

Alleged 'scareware' vendors to pay $8.2 million to FTC
Two participants in a so-called "scareware" scheme settle a complaint from the U.S. FTC. Read More



BECOME AN INSIDER
Get premium content, in-depth reviews, practical tips and exclusive research. All for just signing up. Sign up for free today.

SLIDESHOWS

Panic time quiz: How prepared are you for IPv6?
With IPv4 addresses projected to dry up this year, it's inevitable that IPv6 adoption will accelerate. Here are a few questions that can help determine how much or how little you know about IPv6 and whether you ought to spend more time studying it.

The Mac App Store's hottest productivity apps
The Mac App Store debuted this month and hit 1 million downloads in the first 24 hours. The App Store launched with 1,000 or so apps, many of which were already available on the pre-existing Mac downloads Web site. The store is filled with stuff that's fun but also has plenty of apps that make you more productive. Let's take a look at the 10 most downloaded free productivity apps on the Mac App Store, and then we'll look at the 10 most popular paid productivity apps.

MOST-READ STORIES

  1. Hackers turn back the clock with Telnet attacks
  2. Woman caught smuggling 44 iPhones into Israel
  3. Puppy cams threaten Internet
  4. Facebook unveils security tools after Zuckerberg's page hacked
  5. Inventors of Unix win prestigious Japan Prize
  6. Cisco acquires Pari: What goes around, comes around
  7. Facebook blames Zuckerberg embarrassment on API 'bug'
  8. Intel developing security 'game-changer'
  9. Gartner slams Cisco's single-vendor network vision
  10. Google previews tablet-optimized Android 3.0

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: