WAN

WAN | News, how-tos, features, reviews, and videos

Stuxnet was attacking Iran's nuke program a year earlier than thought

The Stuxnet worm was at work sabotaging a uranium plant in Iran a year earlier than previously thought and before a U.S. covert program to disrupt the facility was officially authorized by former President George W. Bush, according...

McAfee acquires ValidEdge sandboxing technology

McAfee yesterday said it has acquired the ValidEdge anti-malware sandboxing technology from LynuxWorks in order to add a new type of malware detection to its network and endpoint products

RSA: Big data, analytics services will secure data centers

San Francisco -- RSA, the security division of EMC, kicks off its annual security conference on IT security today with a pitch to establish its new Big Data Security and risk-governance products as a foundation for security...

Windows XP and Firefox browser amass worst vulnerability record over past 25 years

In a look at the number of vulnerabilities recorded over 25 years in software products and open source, a researcher at Sourcefire has determined that Microsoft Windows XP and the Mozilla Firefox browser stand out as the two with the...

Dell: We can beat Cisco in enterprise and cloud security

Dell can trump Cisco in the information-technology security market, say Dell's executives in describing how the company with its multifaceted approach will hold an edge against some powerful rivals that also include HP and IBM.

Multivendor power council formed to address digital certificate issues

With cyber-criminals increasingly exploiting digital certificates to undermine security the vendors with the most influence as certificate authorities have banded together to try and speak as an industry group to advocate for...

Merchants urged to avoid BYOD gear, jailbroken smartphones/tablets for payment processing

Businesses that want to make use of consumer-grade smartphones and tablets as a point-of-sale device to process payment cards are being advised to only do so when appropriate encryption controls and other security measures are in...

Key recommendations for SDN IT buyers

Software defined networking (SDN) offers significant opportunities and challenges for enterprise IT professionals. SDN has the potential to make networks more flexible, reduce the time to provision the network, improve quality of...

Windows 8 gets first critical Patch Tuesday security bulletins

Windows 8 hasn't even been on sale for a month yet but is already the recipient of three critical security updates via Microsoft's monthly Patch Tuesday security bulletins, each of which will block flaws that allow remote execution...

Google services went down for 30 minutes in Asia this morning, CDN says

All of Google's service offerings went offline in some parts of the world during an unusual half-hour outage that mainly affected users in Asia, according to content delivery network provider CloudFlare. MORE OUTAGES: Anonymous...

Gartner: How big trends in security, mobile, big data and cloud computing will change IT

When you go to a Gartner conference one of he main things you'll notice is the sheer volume of data they can generate on just about any IT topic. Last week's Gartner Symposium/ITxpo in Orlando, Fla., was no different. The conference,...

These companies help with everything from BYOD to MPLS backup, security management and enterprise search

I get to meet a lot of interesting companies in my capacity here at Network World, some of them newcomers, some more established. Here's a roundup of a few that are addressing common problems: Enterproid: Founded by folks that...

Black Hat panel: Which do you trust less with your data, the U.S. government or Google?

LAS VEGAS -- To celebrate the 15th anniversary of the Black Hat Conference here, a panel of experts got together to expound on what they see as the privacy and security mess of our times, and they had plenty to say about the U.S....

Researcher wows Black Hat with NFC-based smartphone hacking demo

At the Black Hat Conference in Las Vegas Wednesday, Accuvant Labs researcher Charlie Miller showed how he figured out a way to break into both the Google/Samsung Nexus S and Nokia N9 by means of the Near Field Communication (NFC)...

Malware targeting AutoCAD files could be sign of industrial espionage

Malware A written to steal design files made by architects and engineers indicates there's likely been an industrial cyber-espionage effort underway, says ESET, which discovered malware that steals AutoCAD-based files earlier this...

CIOs Should Prepare for the London 2012 Olympics

The London Olympics kick off on July 27, about 5 weeks from now.  Naturally, the Olympics represents international competition, athletic achievement, and host-country pomp and circumstance.  Great entertainment as always but CIOs and...

Price tag for Microsoft piece of Flame malware $1M, researcher says

Back when the Microsoft Update piece of the Flame espionage-software package was still undetected it could have sold for $1 million on the malware black market, a security researcher says. "That discovery is worth a lot of money,"...

U.S. seeking to build international unity around cyberdefense for industrial control systems

SAVANNAH, Ga. -- In the interests of thwarting cyberattacks on critical infrastructure such as energy, water and manufacturing, the Department of Homeland Security (DHS) is quietly reaching out to other governments around the world...

Check Point harnesses cloud security to deter botnet infections in enterprise

Check Point Software Technologies Tuesday announced a cloud-based threat-detection service that can help to identify botnets in real time and block them from wreaking havoc on enterprise networks. Check Point's ThreatCloud relies on...

IETF plays Hide-and-Go-Seek with April Fools privacy protocol

IETF pranksters this weekend revealed their latest April Fools' Day requests for comments, including one that outlines use of Hide-and-Go-Seek techniques to encourage network privacy. RFC 6593, titled "Service Undiscovery Using...

Load More