Search This Blog

Thursday, June 21, 2012

Stuxnet cyberattack by US a 'destabilizing and dangerous' course of action, security expert Bruce Schneier says

  Commercial enterprises are putting our critical infrastructure at risk | New generation of bank Trojans can make invisible transfers
 
  Network World Security

Forward this to a Friend >>>


Stuxnet cyberattack by US a 'destabilizing and dangerous' course of action, security expert Bruce Schneier says
Revelations by The New York Times that President Barack Obama in his role as commander in chief ordered the Stuxnet cyberattack against Iran's uranium-enrichment facility two years ago in cahoots with Israel is generating controversy, with Washington in an uproar over national-security leaks. But the important question is whether this covert action of sabotage against Iran, the first known major cyberattack authorized by a U.S. president, is the right course for the country to take. Are secret cyberattacks helping the U.S. solve geo-political problems or actually making things worse? Read More


RESOURCE COMPLIMENTS OF: SolarWinds

The Case for SIEM in Proactive Network Defense Whitepaper
It's widely accepted that Security Information & Event Management (SIEM) systems are excellent tools for regulatory compliance, log management and analysis, trouble-shooting and forensic analysis, but this technology is also key to actively defending your network. The proactive approach to network security is no longer a luxury, it's a necessity. This whitepaper explains how real-time analysis, combined with in-memory correlation, and automated notification and remediation capabilities can provide you with unprecedented network visibility, security and control. Download the free whitepaper.

WHITE PAPER: Silver Peak Systems, Inc.

Tips to Precisely Measure Packet Loss
Packet loss is increasingly problematic for companies looking to lower DR costs by performing data replication over the WAN. This paper discusses the inaccuracies of measuring packet loss with ICMP (i.e. ping method) and explains how to mitigate this risk with proper packet loss measuring tools. Learn more.

Commercial enterprises are putting our critical infrastructure at risk
Cybercriminals have already figured out how to hack into enterprise infrastructure, and the critical infrastructure that controls our nation's supply of water, gas, oil and electricity just might be next. Read More

New generation of bank Trojans can make invisible transfers
Improved online bank security has driven cybercriminals to start using a type of Trojan tool that automates money theft from compromised accounts in ways that are invisible to account holders, Trend Micro has discovered. Read More


WHITE PAPER: Aerohive

The iEverything Enterprise
Virtualization, cloud computing, and wireless technology are fundamentally changing enterprise computing, providing revolutionary gains in productivity and cost savings. Powerful enterprise applications can now be delivered to almost any device, anywhere, at any time. Learn more.

Apple adds emergency alert notifications with iOS 6
During Apple's WWDC keynote last week, Apple senior VP of iOS software Scott Forstall took the wraps off of iOS 6 and showed off a number of new features including enhanced Siri functionality, deep Facebook integration, the Passbook app, and of course, a revamped Maps app with a nifty little 3D flyover effect and (finally!) built-in turn-by-turn directions. Read More

Some thoughts on transparency in the cloud
David Lingenfelter from Fiberlink is on enough working groups about "Cloud" to float away, if he so desired. From the Cloud Security Alliance to NIST Cloud groups, the man knows the players on the circuit. He recently gave a talk about cloud. I know, another talk about the bloody cloud. Will they ever stop? David's talk was better than most, though. He didn't treat his audience like idiots,... Read More


WHITE PAPER: ADTRAN

Traditional WLAN vs. ADTRAN's Virtual Wireless LAN (vWLAN)
The substantial differences between a traditional hardware controller-based wireless LAN and ADTRAN's virtual wireless LAN (hypervisor-based) are detailed in ADTRAN's WLAN vs. vWLAN comparison chart. Learn more.

Bromium's Microvisor Technology Seeks to Solve Security Issues
When Simon Crosby, one of the founders of virtualization pioneer Xen left Citrix a while back, many in the industry could not wait to see what he would do next. When it was announced that his new company was to be called Bromium, everyone assumed it would be cloud/virtualization related. There were high hopes for the company and a lot of speculation about what Bromium would actually do. Today the veil... Read More

US wants inventive ways to get research out of university labs and into the real world
The federal government funded some $135 billion in research and development (R&D) for all manner of science and technology and is now looking for a way to get a faster return on such investments. Or at least that was the focus of a congressional Subcommittee on Technology and Innovation hearing this week looking for ways to improve collaboration between commercial concerns and nonprofit organizations,... Read More

Report: Flame part of US-Israeli cyberattack campaign against Iran
The highly sophisticated Flame malware was jointly developed by the U.S. and Israeli governments in preparation for a cybersabotage campaign to disrupt Iran's nuclear fuel enrichment efforts, according to a media report. Read More

Data in possible credit card breach appears to be old
A batch of names, addresses, emails and phone numbers of credit card customers around the world released on Monday indicates a breach of a payment processor, but the data appears old. Read More

 
 
 

SLIDESHOWS

Cool Summer Gadget Guide
Here are some suggestions for some great summer gadgets for work, travel, outdoors and exercise that will get you more enjoyment out of the summer season.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. The worst data breach incidents of 2012 - so far
  2. Young employees say BYOD a 'right' not 'privilege'
  3. Review: Samsung Galaxy S III smartphone
  4. Surface for Windows RT vs. the iPad
  5. Juniper confines SDNs to data center
  6. Porn maker's lawsuit against roommate threatens free Wi-Fi
  7. Stuxnet cyberattack by U.S. a 'destabilizing and dangerous' course of action
  8. Apple charges 54% more to replace Retina MacBook Pro's battery
  9. 10 things we like about Ubuntu Linux 12.04
  10. Cisco ONE: Proof that Cisco doesn't get SDNs
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: