От:                                   IT Security at TechRepublic.com [newsletters@techrepublic.online.com]

Отправлено:                  3 августа 2010 г. 18:21

Кому:                              semenov@itep.ru

Тема:                              [TechRepublic] Defcon: GSM encryption is vulnerable

 

Trouble viewing this mail? Read it online | Manage my newsletters | Unsubscribe

 

TechRepublic IT Security

TechRepublic Member | August 03, 2010

 

 

GSM encryption: No need to crack it, just turn it off

There are ways to get around GSM encryption, but the equipment has been expensive and difficult to get -- until now. Michael Kassner explores the latest Defcon breakthrough. Read more

 

Resource of the day

Six Mistakes Companies Make in Tough Times, and How to Avoid Them

In a down economy, the first instinct is to cut costs. There are other equally effective strategic decisions you could be making. Discover the mistakes companies make in a down economy and explore how business intelligence can help you avoid them.

 

Jailbreaking smartphones is finally legal, for now

The EFF won important protections for fair use of copyrighted works and restricted-use consumer technology. Read more

The barbarians are already inside the gates: Mitigating insider threats

An organization's security spending ROI may not be related to traditional controls. Instead, dollars you spend to manage employee behavior might be better spent. Read more

Point release vs. rolling release: Developer, user, and security considerations

Which is the better release model for an operating system? It depends on your goals, including security. Read more

Use pwsafe as a keyboard shortcut driven X tool

No password manager, by itself, suits everyone's needs exactly. A benefit of a command line tool is that it is easily scripted to suit the needs of those who are almost, but not quite, perfectly happy with it. Read more

 

Additional TechRepublic resources

 

Forrester: RIM rules security roost

Apple's iPhone and iPad are increasingly being adopted in the enterprise and secure enough for most firms, but high-security companies are likely to stick with Research in Motion's BlackBerry platform, according to a Forrester Research report. Read more

Five tips for improving a new PC

Out of the box, a new PC needs a bit of fine-tuning to optimize and protect it. Here are a few basic ways to get new PCs ready for action. Read more

Choose which folders you want to encrypt with Espionage

Vincent Danen introduces a useful tool that allows you to encrypt only the folders you choose and that associates easily with specific applications like Mail. Here's how to get the most out of it. Read more

Cracking Open the Apple Magic Trackpad

Bill Detwiler cracks open the Apple Magic Trackpad in this teardown gallery. And, take the poll and tell us if the Trackpad will ever replace the mouse. Read more

 

Featured multimedia

 

TechRepublic's camera phone challenge: Travel

A couple of weeks ago, we encouraged the TechRepublic community to submit travel photos that they had taken with a camera phone. Here are their spectacular entries. View on site

Sights around Black Hat 2010 (photos)

See what CNET's reporters are seeing at this year's gathering of security professionals in Las Vegas. View on site

Intel Museum showcases history of the microprocessor

From Intel's first microprocessor to XScale chips, photos from the Intel Museum in Santa Clara showcase many of the company's biggest achievements. View on site



Gallery perennial favorites

Amazing LEGO creations from Brickworld 2010

Cutting-edge science images from Oak Ridge National Laboratory

Fractal art from the XaoS zoomer

Photo memories of 18 first computers



Today's recommended downloads

Dell OEM Solutions (Dell)

Address All Your Information Archiving and Retention Needs with IBM's Solution (IBM)

Learn how to accelerate your success with engaging learners in a live webinar (Citrix Online)

Hot Aisle? Cold Aisle? Learn Which Method Will Slash Data Center Energy Costs (American Power Conversion (APC))

On-Line Demo Analysis with IBM Cognos Express (IBM)



Connect with TechRepublic

 

twitter

facebook

 


 

 

 

 




MARKETPLACE

Ads by Marchex

Send us your feedback here.

Sign up for more free newsletters from TechRepublic!
To manage your account settings or to remove yourself from all TechRepublic communications, please visit our Subscription Center.

The e-mail address for your subscription is semenov@itep.ru
Unsubscribe from this e-mail | FAQ | Advertise | Privacy Policy

 

Copyright 2010 CBS Interactive, Inc. All rights reserved.
TechRepublic is a registered service mark of CBS Interactive, Inc.

TechRepublic
235 Second Street
San Francisco, CA 94105
U.S.A.



__________ NOD32 5338 (20100803) Information __________

This message was checked by NOD32 antivirus system.
http://www.eset.com