Selasa, 29 November 2011

Doomed by default passwords

U.S. senator demands suspension of phone-tracking system | Hackers target IPv6

InfoWorld's Security Central

Forward this to a Friend >>>


Doomed by default passwords
SCADA systems are under attack like never before, and administrators can no longer count on obscurity as their greatest protector. Here's how to fend off those attacks. Read More


RESOURCE COMPLIMENTS OF: LogRhythm

SIEM 2.0 | See what you're missing.
LogRhythm uniquely analyzes and manages network, host, file and user activity data in a highly scalable, integrated solution. LogRhythm's patented log management and SIEM 2.0 solution detects the previously undetectable, delivers powerful forensics and provides actionable intelligence. Take the Cyber Threat Readiness Quiz.

WEBCAST: Nasuni

Bringing the Cloud to the Data Center
Do you need a solution that securely delivers read & write access to content shared across offices? If so, then you won't want to miss this video about Nasuni's Data Continuity Services. Nasuni delivers multi-site access to a shared storage repository in the cloud that is locally available at every office or location in your organization. Learn more

U.S. senator demands suspension of phone-tracking system
Responding to privacy concerns, two U.S. malls postpone rollout of Point Intelligence technology that tracks shoppers' movement through their phones. Read More

Hackers target IPv6
The biggest looming security threat lies in the fact that enterprise networks already have tons of IPv6 enabled devices, including every device running Windows Vista or Windows 7, Mac OS/X, all Linux devices and BSD. Read More

Google protects its current HTTPS traffic against future attacks
Google has implemented an encryption property known as forward secrecy, which involves using different private keys to encrypt sessions and deleting them after a period of time. Read More

Stop using these 25 passwords today
If you think you're outsmarting potential hackers by using a random noun such as "monkey" or "shadow" as your password or a name such as "bailey" or "ashley," think again. Read More

Face Unlock feature in Galaxy Nexus poses security risk
Face Unlock, the facial recognition software offered in Android 4.0 on the Galaxy Nexus, is being promoted by Google as an alternative to using a PIN to unlock a phone. But early reviewers have noticed that Face Unlock sometimes can be spoofed by a photograph. Read More



DAILY NEWS, DELIVERED TO YOUR INBOX FIRST THING

Start your workday with Today's Headlines: First Look, and find out what the tech world will be talking about all day.
Subscribe now!


Do You Tweet?
Follow everything from InfoWorld.com on Twitter @infoworld.

You are currently subscribed to infoworld_sec_rpt as evoismilf.anime@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@infoworld.com

To contact InfoWorld, please send an e-mail to online@infoworld.com.

Copyright (C) 2011 InfoWorld Media Group, 501 Second St., San Francisco, CA 94107

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@infoworld.com **


Tidak ada komentar:

Posting Komentar

Total Tayangan Halaman