Close
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity
    • IT Management
    • PC Hardware

    Recap: WikiLeaks Saga, Patch Tuesday Lead Security News

    By
    Brian Prince
    -
    December 12, 2010
    Share
    Facebook
    Twitter
    Linkedin

      Cyber-attacks and other twists and turns tied to the WikiLeaks controversy continued to dominate the news this past week.

      The story of the whistle-blower site has taken a number of twists and turns. The week started with the arrest of WikiLeaks founder Julian Assange in the U.K. on sexual assault accusations first levied in Sweden in August. With Assange’s legal problems growing, key figures with WikiLeaks announced they were launching a rival whistle-blower site called Openleaks Dec. 13.

      WikiLeaks supporters meanwhile continued their cyber-assaults on Websites belonging to businesses or institutions taking a stand against WikiLeaks, targeting everything from MasterCard to the Swedish prosecutor’s office with denial-of-service attacks. The situation highlighted the use of opt-in botnets as vehicles of online protest.

      In response to the leak of classified information, the U.S. military has reinstituted a ban on removable media. The armed forces have taken this step before; in 2008, a malware compromise sparked military officials to temporarily ban USB devices.

      Away from the WikiLeaks controversy, Microsoft made its share of news during the week as well. The company is ending the year with a massive Patch Tuesday security update that is slated to have 17 security bulletins. Among the 40 vulnerabilities expected to be fixed is a privilege escalation bug exploited by the infamous Stuxnet worm, as well as an Internet Explorer zero-day the company warned users about last month.

      The company also announced that it is adding a “Do Not Track” feature to Internet Explorer 9. Known as a “Tracking Protection List” (TPL), it will contain Web addresses the browser will only visit if the consumer visits them directly by clicking on a link or typing in the address. By limiting the calls to these Websites and resources from other Web pages, the TPL limits the information these other sites can collect on users, according to Microsoft.

      “Tracking Protection in IE9 puts people in control of what data is being shared as they move around the Web,” explained Dean Hachamovitch, corporate vice president and head of IE development. “It does this by enabling consumers to indicate what Websites they’d prefer to not exchange information with. Consumers do this by adding Tracking Protection Lists to Internet Explorer. Anyone, and any organization, on the Web can author and publish Tracking Protection Lists. Consumers can install more than one.”

      While companies prepare for Microsoft’s Patch Tuesday Dec. 14, a security researcher revealed that hundreds of banking sites were still vulnerable to a 2-year-old security issue affecting certain versions of RSA’s Adaptive Authentication product. According to RSA, EMC’s security division, versions 2.x and 5.7.x of the on-premises edition of the product are vulnerable, and a patch has been available since 2008.

      The past week also saw Juniper Networks acquire virtualization security vendor Altor Networks for $95 million. With the purchase, Juniper seeks to deliver integrated, scalable security architecture protecting physical and virtual systems.

      “Juniper is excited to acquire one of the industry’s leading virtualization security vendors and the extremely talented team that built it,” said Mark Bauhaus, executive vice president and general manager of Service Layer Technologies at Juniper Networks, in a statement. “This acquisition will extend our leadership in data center and cloud security and will enable customers to deploy a consistent set of security services across their physical and virtual infrastructure, while delivering lowest total cost of ownership.”

      Brian Prince

      MOST POPULAR ARTICLES

      Big Data and Analytics

      Alteryx’s Suresh Vittal on the Democratization of...

      James Maguire - May 31, 2022 0
      I spoke with Suresh Vittal, Chief Product Officer at Alteryx, about the industry mega-shift toward making data analytics tools accessible to a company’s complete...
      Read more
      Cybersecurity

      Visa’s Michael Jabbara on Cybersecurity and Digital...

      James Maguire - May 17, 2022 0
      I spoke with Michael Jabbara, VP and Global Head of Fraud Services at Visa, about the cybersecurity technology used to ensure the safe transfer...
      Read more
      Applications

      Cisco’s Thimaya Subaiya on Customer Experience in...

      James Maguire - May 10, 2022 0
      I spoke with Thimaya Subaiya, SVP and GM of Global Customer Experience at Cisco, about the factors that create good customer experience – and...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      Big Data and Analytics

      GoodData CEO Roman Stanek on Business Intelligence...

      James Maguire - May 4, 2022 0
      I spoke with Roman Stanek, CEO of GoodData, about business intelligence, data as a service, and the frustration that many executives have with data...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×