Close
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Menu
Search
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity
    • IT Management
    • PC Hardware

    Recap: WikiLeaks Saga, Patch Tuesday Lead Security News

    By
    Brian Prince
    -
    December 12, 2010
    Share
    Facebook
    Twitter
    Linkedin

      Cyber-attacks and other twists and turns tied to the WikiLeaks controversy continued to dominate the news this past week.

      The story of the whistle-blower site has taken a number of twists and turns. The week started with the arrest of WikiLeaks founder Julian Assange in the U.K. on sexual assault accusations first levied in Sweden in August. With Assange’s legal problems growing, key figures with WikiLeaks announced they were launching a rival whistle-blower site called Openleaks Dec. 13.

      WikiLeaks supporters meanwhile continued their cyber-assaults on Websites belonging to businesses or institutions taking a stand against WikiLeaks, targeting everything from MasterCard to the Swedish prosecutor’s office with denial-of-service attacks. The situation highlighted the use of opt-in botnets as vehicles of online protest.

      In response to the leak of classified information, the U.S. military has reinstituted a ban on removable media. The armed forces have taken this step before; in 2008, a malware compromise sparked military officials to temporarily ban USB devices.

      Away from the WikiLeaks controversy, Microsoft made its share of news during the week as well. The company is ending the year with a massive Patch Tuesday security update that is slated to have 17 security bulletins. Among the 40 vulnerabilities expected to be fixed is a privilege escalation bug exploited by the infamous Stuxnet worm, as well as an Internet Explorer zero-day the company warned users about last month.

      The company also announced that it is adding a “Do Not Track” feature to Internet Explorer 9. Known as a “Tracking Protection List” (TPL), it will contain Web addresses the browser will only visit if the consumer visits them directly by clicking on a link or typing in the address. By limiting the calls to these Websites and resources from other Web pages, the TPL limits the information these other sites can collect on users, according to Microsoft.

      “Tracking Protection in IE9 puts people in control of what data is being shared as they move around the Web,” explained Dean Hachamovitch, corporate vice president and head of IE development. “It does this by enabling consumers to indicate what Websites they’d prefer to not exchange information with. Consumers do this by adding Tracking Protection Lists to Internet Explorer. Anyone, and any organization, on the Web can author and publish Tracking Protection Lists. Consumers can install more than one.”

      While companies prepare for Microsoft’s Patch Tuesday Dec. 14, a security researcher revealed that hundreds of banking sites were still vulnerable to a 2-year-old security issue affecting certain versions of RSA’s Adaptive Authentication product. According to RSA, EMC’s security division, versions 2.x and 5.7.x of the on-premises edition of the product are vulnerable, and a patch has been available since 2008.

      The past week also saw Juniper Networks acquire virtualization security vendor Altor Networks for $95 million. With the purchase, Juniper seeks to deliver integrated, scalable security architecture protecting physical and virtual systems.

      “Juniper is excited to acquire one of the industry’s leading virtualization security vendors and the extremely talented team that built it,” said Mark Bauhaus, executive vice president and general manager of Service Layer Technologies at Juniper Networks, in a statement. “This acquisition will extend our leadership in data center and cloud security and will enable customers to deploy a consistent set of security services across their physical and virtual infrastructure, while delivering lowest total cost of ownership.”

      Avatar
      Brian Prince

      MOST POPULAR ARTICLES

      Android

      Samsung Galaxy XCover Pro: Durability for Tough...

      Chris Preimesberger - December 5, 2020 0
      Have you ever dropped your phone, winced and felt the pain as it hit the sidewalk? Either the screen splintered like a windshield being...
      Read more
      Cloud

      Why Data Security Will Face Even Harsher...

      Chris Preimesberger - December 1, 2020 0
      Who would know more about details of the hacking process than an actual former career hacker? And who wants to understand all they can...
      Read more
      Cybersecurity

      How Veritas Is Shining a Light Into...

      eWEEK EDITORS - September 25, 2020 0
      Protecting data has always been one of the most important tasks in all of IT, yet as more companies become data companies at the...
      Read more
      Big Data and Analytics

      How NVIDIA A100 Station Brings Data Center...

      Zeus Kerravala - November 18, 2020 0
      There’s little debate that graphics processor unit manufacturer NVIDIA is the de facto standard when it comes to providing silicon to power machine learning...
      Read more
      Apple

      Why iPhone 12 Pro Makes Sense for...

      Wayne Rash - November 26, 2020 0
      If you’ve been watching the Apple commercials for the past three weeks, you already know what the company thinks will happen if you buy...
      Read more
      eWeek


      Contact Us | About | Sitemap

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Property of TechnologyAdvice.
      Terms of Service | Privacy Notice | Advertise | California - Do Not Sell My Information

      © 2021 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×