Search This Blog

Wednesday, July 30, 2014

Black Hat 2014: How to crack just about everything

BlackBerry focuses on security for the enterprise | Can information sharing stop bots in their tracks?

Network World Security

Forward this to a Friend >>>


Black Hat 2014: How to crack just about everything
How to crack just about everything As the world’s best security experts prepare to descend on Black Hat USA 2014 next month, they must be rubbing their hands in anticipation of colleague’s upcoming revelations about the latest means to crack a range of devices and flaws they’ve found in trusted protocols. Here is a sampling of some of the hottest presentations and defensive measures speakers will release in order to block the attacks they describe.To read this article in full or to leave a comment, please click here Read More


RESOURCE COMPLIMENTS OF: Guidance Software

You have been breached. You need EnCase.
Did you know 70% of cyber-attacks are at the Endpoint*? Take control with EnCase Endpoint Detection and Response Software. Capture endpoint data across your enterprise to detect, analyze, validate and remediate. Let us show you how to zap your threats with EnCase Cybersecurity and EnCase Analytics. *VERIZON 2014 DBIR Visit Guidance Software at Black Hat – Booth #1141. Don't miss your chance to receive a laser gun or limited t-shirt – just catch one of our hot topic presentations. Not going to Black Hat? Call (888) 999-9712 to find out how to zap your threats.

WHITE PAPER: SIGMA Solutions and EMC Corporation

Confront consumerization with convergence
Virtualization expert Elias Khnaser spotlights the security, compliance, and governance issues that arise when enterprise users "consumerize" with shadow IT and public cloud services. And he provides a prescription for modifying this behavior with a private cloud hosted on a robust converged infrastructure. Learn More

BlackBerry focuses on security for the enterprise
Now that BlackBerry has fallen significantly behind Apple and Google in the race to offer features and third-party apps for its smartphones, the company is concentrating on providing devices that, it claims, have the strongest available security—the killer feature for the enterprise.At a company-sponsored symposium in New York Tuesday, BlackBerry executives made the case that the company’s devices and services could offer levels of security for enterprises mobile devices that can not be replicated on Apple, Android or other mobile devices.BlackBerry’s fortunes have fallen on hard times in the past few years, as feature-friendly Android devices and iPhones have eaten away at sales even on the company’s home turf, the enterprise. But the company’s strong expertise in securing phones may continue to give it a competitive edge in those fields governed by stringent security policies and regulations.To read this article in full or to leave a comment, please click here Read More

Can information sharing stop bots in their tracks?
Bots are a bigger security problem than we think. Those of us who work in security are not unaccustomed to running into bots on the networks we monitor; in Check Point’s 2014 Annual Security Report, released last month, our research found that 49 percent of organizations had seven or more bot-infected hosts.[How retailers can boost security through information sharing]Malware exposure and infections increased across the board last year, reflecting the increasing success of targeted malware campaigns.  In 2013, 73 percent of organizations had at least one bot detected, compared with 63 percent in 2012. Meanwhile, 16 percent of organizations were infected with more than 35 hosts and 77 percent of them had bots on their networks that were active for more than four weeks. But the truth is that we have seen situations that have been far worse—networks with literally thousands of bots running on them. To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: Juniper Networks

Security in the Next-Generation Data Center
This white paper examines these trends, and it reveals the key capabilities that today's security teams require to effectively ensure that vital corporate assets remain secure, while at the same time optimizing access, cost, and administrative efficiency. View Now

Homeland Security wants corporate board of directors more involved in cyber-security
Setting corporate cyber-security policy and taking actions around it must be a top concern for the board of directors at any company, not just the information-technology division, the Department of Homeland Security (DHS) indicated as a high-level official there backed a private-sector effort to raise awareness at the board level.Andrew Ozment, assistant secretary, Office of Cybersecurity and Communications at DHS, today said DHS endorsed the principles spelled out in the “NACD Directors’ Handbook on Cyber-Risk Oversight” published by the National Association of Corporate Directors, which has over 14,000 members who are directors for public, private and non-profit organizations. The DHS will include the NACD’s handbook on the U.S. CERT website as a source of information for businesses. In any organization, the board of directors is there to oversee its general direction, including how well upper management is performing.To read this article in full or to leave a comment, please click here Read More

Guns, vandals and thieves: Data shows US networks under attack
More than a thousand malicious acts have targeted the US telecoms infrastructure in recent years, FCC data shows Read More


WHITE PAPER: HP

Why you need a next-generation firewall
This white paper explores the reasons for implementing NG firewalls and lays out a path to success for overburdened IT organizations. Learn More

Rocket Lab wants to make Model T of space satellite launchers
When it comes to blasting satellites into Low Earth Orbit, cost can be a major detriment.An Australian company called Rocket Labs is looking to fix that problem – at least for smaller satellite launches—with a carbon composite, 11-ton , 18 meter (about 60ft) tall rocket known as Electron that it says can blast payloads of about 100kg (about 220lbs) into LEO for about $5 million. The company says comparable flights would cost around $100 million.+More on Network World: Quick look: The hot Asian space industry+To read this article in full or to leave a comment, please click here Read More

Android vulnerability allows malware to compromise most devices and apps
The majority of Android devices currently in use contain a vulnerability that allows malware to completely hijack installed apps and their data or even the entire device.The core problem is that Android fails to validate public key infrastructure certificate chains for app digital signatures, said Jeff Forristal, chief technology officer of Bluebox Security, a San Francisco company whose researchers discovered the issue.According to Google’s documentation, Android applications must be signed in order to be installed on the OS, but the digital certificate used to sign them does not need to be issued by a digital certificate authority. “It is perfectly allowable, and typical, for Android applications to use self-signed certificates,” the documentation says.To read this article in full or to leave a comment, please click here Read More


SLIDESHOWS

Black Hat 2014: How to crack just about everything

From cell phones and cars to IPv6 security researchers have turned their skills against a world of technology.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Windows 9 in November? Don't believe it

2. 10 amazing (and bizarre) drone discoveries

3. About those alleged backdoors in Microsoft products...

4. 17 obscure Windows tools and tricks too powerful to overlook

5. BYOA: Bring Your Own Authentication

6. Top 25 free tools for every Windows desktop

7. Cisco ready to ship ACI controller

8. Say goodbye to desktop phones

9. New products of the week 07.28.2014

10. Malwarebytes questions poor showing in anti-malware protection-evaluation lab testing


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: