Friday, August 26, 2011

Scariest IPv6 attack scenarios

Hackers could reverse-engineer Microsoft patches to create DoS attacks | What is a next-generation firewall?

Network World Compliance

Forward this to a Friend >>>


Scariest IPv6 attack scenarios
Experts are reporting a rise in the number of attacks that take advantage of known vulnerabilities of IPv6, a next-generation addressing scheme that is being adopted across the Internet. IPv6 replaces the Internet's main communications protocol, which is known as IPv4. Read More


WEBCAST: BMC

Simplify, Improve, and Save with Dynamic Workload Management
Join us in our conversation with John McKenny, BMC vice president of Worldwide Marketing for Mainframe Service Management (MSM), as we uncover the advantages of dynamic workload management. Learn More!

WEBCAST: Riverbed

What Your Network Isn't Telling You
Are your network tools outdated? This Cascade "chalk talk" shows how to monitor today's network with support for virtualization and cloud and: - Behavioral analytics that learns how your network behaves - Network drill-down to quickly spot root causes of problems - Discovery and dependency mapping of IT assets Learn more!

Hackers could reverse-engineer Microsoft patches to create DoS attacks
A security company has demonstrated how to reverse-engineer a Microsoft patch in order to launch a denial-of-service attack on Windows DNS Server. Read More

What is a next-generation firewall?
If there is a simple way to describe the difference between a next-generation firewall and a traditional firewall, it is "more detailed controls." In firewall terms, people talk about "widening the 5-tuple." Read More

Portland General Electric tries smart security monitoring
Why Portland General Electric deployed Security Information and Event Management (SIEM) technology and what they've been able to accomplish as a result. Read More

Touring the Linux Hall of Fame: Whiskey, floppy disks and fan letters
Network World's Julie Bort gets a tour of the first-ever Linux Hall of Fame exhibit at LinuxCon, held in Vancouver in August. The exhibit features signed items from the Who's Who of the Linux world. Read More


WHITE PAPER: Dell

Mobile Technology: The Productivity Edge
IT must devise a workable balance by ensuring security of mobile data without squashing worker productivity. This Mobility KnowledgeVault will walk you through four key factors to build a workable plan and highlights real-world examples of businesses that are succeeding at fulfilling the productivity promise of mobility. View now

Lawsuit accuses comScore of extensive privacy violations
A proposed class-action lawsuit filed in federal court in Chicago on Tuesday accused online tracking and analytics firm comScore of surreptitiously collecting Social Security numbers, credit card numbers, passwords and other data from consumer systems. Read More

Twitter turns on SSL encryption for some users
Twitter is slowly turning on automatic encryption on its website, a move following other major providers of web-based services to thwart account hijacking over wireless networks. Read More

Apache warns Web server admins of DoS attack tool
Developers of the Apache open-source project today warned users of the popular Web server software that a denial-of-service (DoS) tool is circulating that exploits a bug in the program. Read More

MIT researchers craft defense against wireless man-in-middle attacks
A new technique crafted by MIT researches can detect the tampering that's essential to man-in-the-middle attacks in wireless networks. Read More


WHITE PAPER: GFI Software

Security Considerations for SMEs
It is never possible to guarantee that a company is totally secure or that a breach will not occur, however implementing the latest tools and providing ongoing, end-user education will minimize those risks and allow companies to focus more on growing their business rather than repairing it. Read now!

Android now most attacked mobile OS, McAfee reports
Google's Android operating system is now the most-targeted mobile platform for malware, according to McAfee's latest threat report. Read More

iPhone thief accidentally IDs himself via Photobucket
Photobucket has a cool mobile application that allows users to automatically upload mobile pictures to the company's photo-sharing website. That's something that Korey Heess is unlikely to forget anytime soon, after allegedly snapping a picture of himself that was used by police to identify him as a smartphone thief. Read More

Palo Alto PA-5060 is one fast firewall
Palo Alto's new firewall delivered performance 10 times faster than when we tested in 2008, and came close to its rated capacity of 20Gbps in firewall-only mode, according to our exclusive Clear Choice testing. Read More

Yale warns 43,000 about 10-month-long data breach
Yale University has notified about 43,000 faculty, staff, students and alumni that their names and Social Security numbers were publicly available via Google search for about 10 months. Read More



GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

SLIDESHOWS

The world's geekiest license plates
This slideshow goes out to all those drivers who aren't afraid to say it loud: I'm a geek and I'm proud. It's filled with images of vanity plates so geeky that they prompted someone else to take a picture and post it on Flickr. Enjoy.

MOST-READ STORIES

  1. The world's geekiest license plates
  2. Future TSA: Track All 'Daily Travels To Work, Grocery Stores & Social Events'
  3. 21 Chrome Web Apps for Serious Work
  4. Why You Shouldn't Buy a Discounted TouchPad Tablet
  5. iPhone thief accidentally IDs himself via Photobucket
  6. Before the iPhone: The kings of mobile
  7. Top 10 made-in-China iPhone apps
  8. Aging East Coast infrastructure a concern after quake
  9. Tablets becoming popular bathroom activity, survey finds
  10. Palo Alto earns short list status

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: