Google adds VPN and virtual desktop to Chromebook
Google has added virtual private network (VPN) and secure WiFi support in its latest stable Chrome OS release for its pay-as-you-go laptops.
Google has added virtual private network (VPN) and secure WiFi support in its latest stable Chrome OS release for its pay-as-you-go laptops.
Even as the shadowy hacker group Anonymous threatens to take on the mighty social-networking site Facebook, claiming the group will <a href="http://www.networkworld.com/news/2011/081011-anonymous-allegedly-threatens-to-kill.html?source=nww_rss">'kill' Facebook</a> on Nov. 5, some researchers are criticizing Facebook security, saying it could be better.
Ellen Messmer | 11 Aug | Read more
The increase in cyber attacks has driven a growth in demand for network security staff, according to a report into the information security jobs market.
Anh Nguyen | 10 Aug | Read more
Bug bounty programs are designed to reward security researchers for finding flaws in a vendor's product that have made it past their own quality processes. Some organizations, such as Google and Mozilla, have had bug bounty programs in place for a time, while social networking site <a href="http://www.csoonline.com/article/686924/facebook-to-pay-hackers-for-bugs">Facebook just announced a bug bounty program</a> with a base reward of $500.
George V. Hulme | 10 Aug | Read more
Microsoft has released 13 security updates for its August Patch Tuesday update, five of which it considered likely to see reliable exploits developed for within the next 30 days.
LAS VEGAS -- The relationship between CISOs and <a href="http://www.networkworld.com/topics/security.html">security</a> penetration testers is anything but clear-cut and raises ethical issues for both parties, a Defcon crowd heard from a former CISO.
Tim Greene | 08 Aug | Read more
Leading US critical infrastructure security consultant Eric Byres has slammed security practices at Siemens following the demonstration of serious security vulnerabilities in their S7 programmable logic controllers (PLCs) at Black Hat 2011.
Stilgherrian | 08 Aug | Read more
While still not great, the operating systems behind Apple desktops, laptops and phones are getting more secure, <a href="http://www.networkworld.com/news/2011/080411-blackhat-overview.html?hpg1=bn">researchers at Black Hat</a> say.While not recommended for corporate use unless it’s in islands within larger networks, the OSX operating system has made strides, says Alex Stamos, who lead a team of researchers from iSec Partners that researched the OSX and Windows 7 operating systems.
Tim Greene | 08 Aug | Read more
To prevent online privacy breaches Australia needs a privacy watchdog rather than merely guidelines, a law lecturer has argued.
Lisa Banks | 08 Aug | Read more
Researchers at Microsoft are looking at a virtual machine “Rozzle” to detect browser malware that remains hidden until it finds the right plug-in or browser flaw to exploit.
Stories about lost wages aren't the only scary things being talked about in Sin City this week. The best security researchers and hackers from around the world have gathered in Las Vegas, and news about their work has been creeping out like a toxic flood.
Christina DesMarais | 07 Aug | Read more
Hackers with ties to Anonymous' AntiSec movement continued their assault on law enforcement by releasing 10 gigs of sensitive information from 56 law enforcement entities across the country.
Paul Suarez | 07 Aug | Read more
If you'd never heard the phrase 'advanced persistent threat' before, you may have gotten an ear full of it the past week in a collection of news stories that used the APT term to describe a variety of network security problems that are causing big problems.
Ellen Messmer | 06 Aug | Read more
A former Cisco engineer at the center of an <a href="http://www.networkworld.com/community/blog/cisco-sought-paint-whistleblower-sinister">extradition controversy</a> has been indicted by a federal grand jury on computer hacking charges.
PureWAF, an Australian-developed managed firewall service designed to protect web applications, won the security section of the national iAwards last night for its developers, information security consultancy Pure Hacking.
Stilgherrian | 05 Aug | Read more
Standards body the IEEE has called for proposals to build a catalogue of people using binary “packers”, the software tools often used by malware writers to hide executable files from antivirus products.
Every major corporation harbouring valuable information has been compromised, but only some know it, according to executives at McAfee and RSA.
The Metropolitan Police has expanded a hacking probe at Rupert Murdoch's News International, publisher of the now defunct News of the World newspaper, to include fresh allegations of email and computer hacking by journalists.
The biggest business challenge today, in the minds of many information security officers, is the stealthy online infiltration by attackers to steal valuable proprietary information. The reality, they say, is that these so-called "advanced persistent threats" are so rampant and unrelenting they are forcing IT to rethink network security.
Ellen Messmer | 03 Aug | Read more
<a href="http://www.networkworld.com/reviews/2011/052311-check-point-blade-test.html">Check Point Software</a> has new, heavy-duty <a href="http://www.networkworld.com/topics/security.html">security</a> gateway hardware for data centers and service providers, including one chassis that will grow to support a 1Tbps firewall.
Tim Greene | 03 Aug | Read more