Search This Blog

Friday, October 28, 2011

Chinese hackers may have attacked U.S. satellites

Computer analysis, online translator, intelligent guesses crack ancient German code | Top tech-o-lanterns from around the Web

Network World Compliance

Forward this to a Friend >>>


Chinese hackers may have attacked U.S. satellites
Suspected Chinese hackers interfered with two U.S. satellites on four separate occasions in 2007 and 2008, according to a Bloomberg Businessweek story that cites an upcoiming report by a congressional commission. Read More


WHITE PAPER: Akamai Technologies, Inc.

Understanding Web Application Security
This paper examines current trends in Web application security, assessing the present threat environment as well as limitations in existing approaches to protection. Learn more

WHITE PAPER: Akamai Technologies, Inc.

Protecting Your Online Channels and Web Applications
This whitepaper gives a broad overview of the ways in which Akamai can help organizations bolster the security of their Web-based assets, with capabilities ranging across the application, network, and DNS layers, as well as solutions focused on Distributed Denial of Service (DDoS) mitigation and business continuity. Learn more

Computer analysis, online translator, intelligent guesses crack ancient German code
The encrypted initiation rite of an ancient German secret society preoccupied with ophthalmology has fallen to modern language analysis tools including an online automatic translator. Read More

Top tech-o-lanterns from around the Web
We've scoured the Web to find the best geeky gourds carved up by true techies. Take a look and then share your favorite tech-o-lanterns. Read More


WHITE PAPER: Riverbed

Case Study – Petrobas
Download the case study to learn how Riverbed deployed Steelhead® appliances to reduce Petrobras' backup window from 34 hours to four hours, improve application performance for remote workers to LAN-like speeds, and more. Read now!

IBM anoints Q1 Labs technology as centerpiece of security portfolio
IBM intends to make the security information and event management (SIEM) technology gained through the acquisition of Q1 Labs, which was officially closed yesterday, the centerpiece of IBM's broad security product portfolio. Read More

Attackers trick Facebook users into exposing secret security codes
New social engineering attacks are tricking Facebook users into exposing anti-CSRF tokens associated with their sessions. These security codes allow attackers to make unauthorized requests through the victim's browser. Read More


WHITE PAPER: CA Technologies

Service Assurance Defined
This Forrester paper explains the concept of service assurance and highlights how it can address fundamental issues around managing application performance and business services. Learn More

MIT building tracks researchers, visitors
New tracking technology inside the MIT Media Lab monitors everything from office thermostats, to social media buzz to the location of workers. Read More

Researchers find "massive" security flaws in cloud architectures
German researchers say they found flaws in Amazon Web Services that they believe exist in many cloud architectures and enable attackers to gain administrative rights and to gain access to all user data. Read More

How to rob a bank: A social engineering walkthrough
If a company hires us for a social engineering engagement, typically they want us to get in and get to their back-up tapes, or into the data in their document room. Read More

Duqu, Stuxnet link unclear
A report by Dell SecureWorks debunks the idea that the newly discovered Duqu Trojan is related to last year's Stuxnet worm or was created by the same authors. Read More



SLIDESHOWS

20 high-tech toilets
Today's techiest toilets incorporate music players, motion-activated lids, heated seats, washing and drying functions, and more. Take a look.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center and Microsoft training of the winner's choice from Webucator.. Enter here.Also: Please take our survey on certifications and your career

MOST-READ STORIES

  1. New Nokia phone name, Lumia, means 'prostitute' in Spanish
  2. U.S. to fund aggressive technology that cuts solar power costs 75%
  3. Researchers find "massive" security flaws in cloud architectures
  4. RIM faces possible class action suit over BlackBerry outages
  5. Citrix: Virtual desktops about to become cheaper than physical ones
  6. 5 tech pros companies want to hire
  7. Target.com's second site crash could become e-comm nightmare
  8. Cloud security: Mission impossible
  9. Week 1: Ubuntu Unity instead of Windows 7 and ready to scream
  10. Social engineering: My career as a professional bank robber

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: