Search This Blog

Monday, August 27, 2012

How to handle a digital-certificate fraud incident

Would you open your home to a hacker – for free? | Computerized conveniences make cars next target for hackers

Network World Security

Forward this to a Friend >>>


How to handle a digital-certificate fraud incident
Are you prepared to deal with a security incident involving digital-certificate fraud? You should be, because if it happens, it might well involve the need to replace thousands of digital certificates used for security by your organization in applications or for other purposes. Here's how to prepare for bad news and be ready to respond when criminals undermine the complex public-key infrastructure (PKI) ecosystem. Read More


WHITE PAPER: McAfee

As Data Centers Evolve, So Do Security Needs
Choose McAfee Network Security Platform to stop threats and maintain continuity across data centers, cloud services, virtualized and in the rack deployments. Intrusion prevention at up to 80 Gbps leverages McAfee Global Threat Intelligence. Learn more. Learn more in the McAfee Securing Cloud-Based Services KnowledgeVault. Read now.

WHITE PAPER: Blue Coat Systems

Optimize and Secure Cloud, SaaS, BYOD, and Social Media
Today's threat landscape has migrated to the web causing many security professionals to prevent direct Internet access at the branch. But with new cloud-based security solutions from Blue Coat you can re-architect your network to embrace the Internet – safely – and optimize application performance. Learn more.

Would you open your home to a hacker – for free?
What do you get when you mix access to Google's ultra-fast fiber network and old fashioned grass roots business ideas? Well, in this case you'd get someone living on your couch for free for three months. This week a group calling itself the "Kansas City Hacker Homes," launched a program that calls on the good folks of Kansas City to open up their homes to entrepreneurs and developers who would live... Read More

Computerized conveniences make cars next target for hackers
All those computerized conveniences in your new car -- dozens of them -- also make it a tempting, rolling menu of attack surfaces for hackers, who can exploit vulnerabilities to steal your car, eavesdrop on what you think are private conversations and even sabotage systems that could make it crash. Read More


WHITE PAPER: McAfee

McAfee SIEM and FairWarning deliver a unified solution
Government regulations, electronic health records, and new Internet health services create a myriad of security challenges for healthcare compliance and information security teams. Security management needs to change to provide value, visibility, and viable information to keep this information protected. Learn more.

Phishing attack targets users with fake BlackBerry ID email
Security vendors say they've spotted phishing attacks trying to fool BlackBerry users into opening email on their Windows machines that launches malware for taking over the system. Read More

Wi-Fi Alliance starts certifying tunnel technology for better wireless performance
The Wi-Fi Alliance has launched a program to certify products that support TDLS (Tunneled Direct Link Setup), a technology that allows devices to automatically create a link between each other after accessing a wireless network, removing the need to transmit data through the access point, and avoiding delays caused by congestion, the organization said on Thursday. Read More


WHITE PAPER: Citrix Systems

Citrix NetScaler. 2x faster 2048-bit SSL performance than F5
Ready for 2048-bit SSL? Not with F5. Don't let stronger security compromise performance. NetScaler gives your network a competitive edge with the industry best 2048-bit SSL transaction/sec performance. 2x faster SSL performance than F5. 50% lower SSL costs. Learn More

Cybercriminals take advantage of Android Flash Player gap on Google Play
Cybercriminals are trying to capitalize on Adobe's decision to stop distributing Android Flash Player to new users via Google Play by creating malware and adware apps that masquerade as Flash Player installers. Read More

NASA's hot radiation mission
NASA is set to launch its Radiation Belt Storm Probes (RBSP) to explore the most intense areas of radiation around Earth Read More

iPhoneography: Amazing artwork created using an iPhone
The inaugural LA Mobile Arts Festival in Santa Monica this week features more than 600 images of artwork, all of which originated from the lens of an iPhone Read More

Kill timer found in Shamoon malware suggests possible connection to Saudi Aramco attack
A timer found in the Shamoon cyber-sabotage malware discovered last week matches the exact time and date when a hacktivist group claims to have disabled thousands of computers from the network of Saudi Aramco, the national oil company of Saudi Arabia. Read More



SLIDESHOWS

9 ex-Googlers on the move
Former Google employees continue to make their mark on the tech world.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Android news and rumor roundup for the week ending Aug. 24
  2. Building your first desktop PC
  3. Building a PC: My components
  4. New VMware products, services target small, medium businesses at VMworld
  5. New Amazon Kindle Fire models coming Sept. 6?
  6. Home Wi-Fi routers could operate as emergency network, say scientists
  7. With iPhone 5 on the way, iPhone 4 & 4S deals spring up
  8. New BIOS security standards aimed at fighting rootkit attacks
  9. Microsoft removes Windows 8 grace period, inconveniences everybody
  10. Microsoft reveals new logo to represent wealth of new products

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


1 comment:

Amelia said...

Very surprising. I am thankful to you for posting all these great advise that will help one to prepare to handle this difficult situation. I will do also share this helpful information with my friends too.
digital certificate