Tuesday, December 1, 2015

Millions of embedded devices use the same hard-coded SSH and TLS private keys

  US Marshals jump into 'Cyber Monday' mania | Older Dell devices also affected by dangerous eDellRoot certificate

 
  Network World Security  

Millions of embedded devices use the same hard-coded SSH and TLS private keys
Thousands of routers, modems, IP cameras, VoIP phones and other embedded devices share the same hard-coded SSH host keys or HTTPS server certificates. Read More
 


WEBCAST: DataGravity

Data Security Breaches are the New Normal. Are You Prepared?
High profile data security breaches are occurring more frequently than ever before. Sensitive and confidential data, such as personally identifiable information (PII), proprietary business information, and intellectual property are being leaked beyond secure company perimeters. Learn More

: Ping Identity Corporation
 
Secure Identity Standards
Paul Madsen, senior technical architect, Office of the CTO, Ping Identity, has participated in identity standards efforts including SAML, the Simple Cloud Identity Management (SCIM), OAuth 2.0 and TV Everywhere. He recently discussed the company's viewpoint on standards in Identity and Access Management (IAM). Read his Q&A here. Learn More

US Marshals jump into 'Cyber Monday' mania
OK so it's not Amazon, Target or Wal-Mart Cyber Monday sales but the US Marshals are offering up what it calls "Cyber Monday" auctions for ill-gotten-booty."Cyber Monday is generally thought to be the start of the online holiday shopping season. We would like to encourage shoppers who are already online in search of bargains to consider stopping by our auction website to bid on forfeited assets," said Jason Wojdylo, Chief Inspector of the U.S. Marshals Service Asset Forfeiture Division in a statement. These online auctions are designed to generate proceeds from ill-gotten gains to give back to victims, he stated.To read this article in full or to leave a comment, please click here Read More
 


: Unisys

How do You Secure Financial Transaction Data?
A major Brazilian supermarket chain with thousands of employees and stores in 14 different cities had a significant security issue. Not only did it need to close the gaps in its IT environment, it also needed to become 100 percent compliant with Payment Card Industry (PCI) standards. Learn More

Older Dell devices also affected by dangerous eDellRoot certificate
Users who have Dell Windows-based laptops, desktops, tablets and other devices that were bought before August should check if their systems have the self-signed eDellRoot certificate that can compromise their private communications. Read More
 


WHITE PAPER: Entrust, Inc.
 
5 Ways Mobile will Transform Enterprise Authentication
Mobile devices are secure — in fact, more secure than PCs. And their transportability makes them more convenient too. By leveraging mobile devices in your enterprise authentication, you can take significant strides toward both bolstering efficiency and strengthening security. Learn More

SAFECode: How to ensure you're buying safe software
The Software Assurance Forum for Excellence in Code (SAFECode) has issued guidelines to make it easier, especially for businesses trying to decide which products to buy. Read More
 

Dell admits installing security hole on laptops, apologizes, offers fix
Dell acknowledges the root certificate it installed on its laptops was a bad idea and has issued instructions on how to remove it. Read More
 

Walmart hired Lockheed Martin for employee surveillance, allegedly got help from FBI
  Testimony and documents indicate Walmart hired defense contractor Lockheed Martin to conduct surveillance of employees involved with rights group OUR Walmart and allegedly received assistance from the FBI Joint Terrorism Task Force after members of the Occupy movement became involved. Read More
 

 

SLIDESHOWS

10 products that big tech companies have open-sourced recently

Releasing internal products to the open-source community is the hip new thing for technology giants to do.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 3 hot Apple Watch deals on Black Friday & Cyber Monday

2. 20 cool things you can do with a Raspberry Pi

3. 19 free cloud storage options

4. 7 free Wi-Fi stumbling and surveying tools for Windows and Mac

5. 10 products that big tech companies have open-sourced recently

6. 9 ways Windows 10 just got better

7. What would the perfect Linux distro look like

8. 7 hot Microsoft Xbox Black Friday 2015 deals

9. After breach, Cisco takes cert tracker offline

10. Apple Watch 2 rumors start heating up


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


ads

Ditulis Oleh : Angelisa Vivian Hari: 5:42 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive