Search This Blog

Thursday, February 26, 2009

Top 10 removable-media security incidents; PCI council ranks security risks, milestones

PCI council devises a 12-step program for meeting security standards.
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Juniper Networks
rule

Expert advice on improving a data center
Discover how to significantly simplify your data center architecture while containing costs and improving efficiency and reliability. On March 12, data center design and implementation experts will share in-depth advice on new approaches and examples of deployments - including price, performance and savings. Register for this Live Webcast now.

rule

Spotlight Story

Top 10 removable-media security incidents
Stiennon: I thought it would be valuable to put the top 10 most important incidents regarding removable devices, including hardware keystroke loggers, USB thumb drives, and MP3 players, together into a list. It helps highlight the risks inherent in removable devices to have all of these incidents in one place. Read more.

Related News:

Network World on Twitter Get our tweets and stay plugged in to networking news.

PCI council ranks security risks, milestones Businesses shouldn't let financial pressures put PCI-security compliance on the back burner, and the PCI Security Standards Council has devised has devised a 12-step program to help merchants get there.

Fight Malware on the Smartphone As more and more people bring personal technology into the workplace-most often smartphones--malicious code writers are beginning to take notice and target these weak points of entry. In its 2009 Cyber Threat Report, the Georgia Tech Information Security Center cited the possibility of botnets moving from the desktop to the smartphone within the year. A few enterprise security vendors are not waiting.

Hacking contest to pay $10,000 in cash for smartphone bugs A hacking contest slated for next month will award cash prizes of $10,000 to anyone who can break into the most popular smartphones, including Apple's iPhone and Research in Motion's BlackBerry.

After CERT warning, Microsoft delivers AutoRun fix Microsoft is pushing out a software update to some Windows users that fixes a bug in the Windows AutoRun software, used to automatically launch programs when DVDs or USB devices are introduced to the PC.
Also: Microsoft issues two security advisories: for Excel exploit, Windows AutoRun

VPN security – Do you know where your keys are? Demand for mobile and remote access to small- and midsized business networks has increased dramatically. Even the most basic VPN technologies are so accessible and affordable that there is no good reason for failing to utilize them. That said, the real question for SMBs is which type of VPN to implement: Standard IPSec or SSL?

Adobe patches Flash vulnerabilities for three platforms Adobe Systems has updated its Flash multimedia software to eliminate five flaws affecting Windows, OS X and Linux systems.

Survey: Economy Forces Many to Slash, Freeze Security Staff Current economic conditions are having a negative impact on the majority of security budgets, according to a survey conducted by CSO. Many respondents indicated hiring freezes or staff reductions were necessary due to the financial crisis.

Last.fm Denies Handing User Data to RIAA Last.fm has vehemently denied a report alleging that it handed information about users who listened to a leaked music album over to the Recording Industry Association of America (RIAA) data.

February giveaways from Cisco Subnet and Microsoft Subnet
Up for grabs: One American Express gift card worth $250 from Global Knowledge; One Microsoft training course worth $2,995 from Global Knowledge; 15 copies each of the hot book titles Voice over IP Security, and CCNA Wireless Official Exam Certification Guide and 15 copies of Exchange Server 2007 How-To: Real Solutions for Exchange Server 2007 SP1 Administrators. Get all the entry details here.


Best of the Tests 2009
Best of the Tests 2009Out of the more than 150 products tested, a baker's dozen rise to the top of the list.

Fave Raves
2009 Fave RavesSix readers dish on their must-have network products, from desktop systems to wireless access points.

Sponsored by Juniper Networks
rule

Expert advice on improving a data center
Discover how to significantly simplify your data center architecture while containing costs and improving efficiency and reliability. On March 12, data center design and implementation experts will share in-depth advice on new approaches and examples of deployments - including price, performance and savings. Register for this Live Webcast now.

rule

Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies.
Download this Executive Guide now.


The Power of LAN Test Tools.
Successfully deploy a wired/wireless Ethernet network and keep it running with exceptional up-time. Ensure your network is ready for new technologies by running assessment tests that provide you with the data you need. Resolve connectivity issues and quickly address network performance complaints. Get all of the details today.
Download this whitepaper now.

 

02/26/09

Today's most-read stories:

  1. 40% of geeks surveyed really work fewer than ... say what?
  2. Juniper's answer to Cisco in the data center: Stratus Project
  3. Gmail chat invaded by phishing scam
  4. Microsoft has big growth plans even as economy limps
  5. Five fantastic open source tools for Windows admins
  6. IPhone-controlled car to demo at Geneva Motor Show
  7. VeriSign: We will support DNS security in 2011
  8. Check Point overhauls its security software
  9. 2009 Best of Tests winners
  10. Turning 5,000 discarded cell phones into art


A Simplified Data Center - Live March 12
Contain costs and improve efficiency and reliability by simplifying your data center architecture. On March 12, data center design and implementation experts share in-depth advice on new approaches and examples of deployments - including price, performance and savings.
Register today for this Live Webcast.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: