Search This Blog

Monday, July 30, 2012

Tools released at Defcon can crack widely used PPTP encryption in under a day

Researcher creates proof-of-concept malware that infects BIOS, network cards | Apple disappoints Black Hat

Network World Security

Forward this to a Friend >>>


Tools released at Defcon can crack widely used PPTP encryption in under a day
Security researchers released two tools at the Defcon security conference that can be used to crack the encryption of any Point-to-Point Tunneling Protocol and WPA-2 Enterprise sessions under the right circumstances. Read More


WHITE PAPER: IBM

Delivering enterprise solutions for a world on the move
IBM supports SAP clients with business consulting services with global implementation and outsourcing capabilities plus infrastructure of optimized servers (mainframe, POWER, x, BladeCenter) and storage, DB2 database, Alloy, middleware and software. An innovation partner for SAP projects. Learn More.

WEBCAST: Webroot

SecureAnywhere Business Endpoint Protection
Traditional solutions have been failing us since the 90s. See how Webroot is changing endpoint data protection with a new way of looking at security that is 30x faster than leading solutions at a fraction of the footprint. Download a free-trial in just six seconds. Learn More!

Researcher creates proof-of-concept malware that infects BIOS, network cards
Security researcher Jonathan Brossard created a proof-of-concept hardware backdoor called Rakshasa that replaces a computer's BIOS and can compromise the operating system at boot time without leaving traces on the hard drive. Read More


WHITE PAPER: Fluke Networks

Maintain Fiber Network Health
This white paper helps fiber installers and network technicians understand the key parameters for selecting an OTDR. Choosing the right device not only solves this new generation of datacenter testing requirements, but also helps professionals work efficiently, and increase the reliability and value of the enterprise fiber network. Learn More!

Apple disappoints Black Hat
Apple's inaugural security talk at Black Hat provided little more than what the company had already published in a May white paper. Read More


WHITE PAPER: F5

Three Phases to Improve Application Delivery Teams
Most organizations struggling with application performance have not developed the processes and organization that can maximize the benefits of their application delivery solutions. In this report, Gartner outlines three phases to help IT organizations improve their structure to deliver better application performance. Learn More!

NSA chief asks hackers at Defcon for help securing cyberspace
In seeking cybersecurity help from Defcon attendees, NSA chief Gen. Keith B. Alexander said that if you don't see a cyberattack you can't defend against it, and at the moment, the NSA has no insight if Wall Street is going to be attacked, for example. Read More

Black Hat: Researcher pinpoints promising ways to attack Windows 8
Windows 8 offers some promising opportunities for attackers, but overall is a much more secure operating system than its predecessor, a researcher told the Black Hat conference. Read More

Researcher wins $200,000 prize from Microsoft for new exploit mitigation technology
Security researcher and Columbia University PhD student Vasilis Pappas was announced the winner of the Microsoft BlueHat Prize contest for an exploit mitigation technology called "kBouncer" which is designed to detect and prevent return-oriented programming attacks. Read More



SLIDESHOWS

18 Notable Apple Alumni
While some with Apple ties are already well-known, others may be surprising to find on the list.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. The day VMware ate Cisco
  2. The 5 hottest IT jobs right now
  3. Windows 8 is a 'catastrophe,' says Valve founder and former Microsoft employee Gabe Newell
  4. Quirkiest moments at 2012 Black Hat security conference
  5. Black Hat: Shark-bitten security researcher takes another chomp out of Oracle database
  6. Researcher wows Black Hat with NFC-based smartphone hacking demo
  7. Google Talk users lash out over major outage
  8. Cisco layoffs this week part of 'Transformation Project'
  9. Earliest known photos of an Apple iPad prototype
  10. Tatu Ylonen, father of SSH, says security is 'getting worse'

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: