Search This Blog

Friday, February 20, 2009

The Ultimate Browser Security Face-Off; Security researcher Kaminsky pushes DNS patching

Sensible user behavior and patching have greater impact on security than browser choice
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Oracle
rule

IDC: Preventing Enterprise Data Leaks at the Source
This IDC report presents a preemptive approach to information protection and control (IPC). It discusses the growing internal threats to business information, the impact of government regulations on the protection of data, and how enterprises must adopt database security best practices to prevent sensitive customer data or company information from being distributed within or outside the enterprise in violation of regulatory or company policies. Review this research today.

rule

Spotlight Story
The Ultimate Browser Security Face-Off

By Tom Kaneshige
The Web is teeming with venomous exploits. And an ever-increasing quantity of that malware sneaks onto hard drives via the browser. Read full story

Related News:

Security researcher Kaminsky pushes DNS patching Dan Kaminsky, who for years was ambivalent about securing DNS, has become an ardent supporter of DNS Security Extensions.

Hacker claims SQL bug on Symantec site A Romanian hacker who has spent the past few weeks exposing a common, but dangerous, Web programming error on security vendors Web sites says he's found a SQL injection flaw on Symantec's Web site. But Symantec says it's not a security issue.

Podcast: Parents vs. kids: Online activity monitoring Symantec unveils its Norton Online Family service this week and Newsmaker Jody Gibney explains why the cloud service could get parents and kids talking about what not to do while surfing the Internet. (10:55)

DHS names Callahan privacy chief The Department of Homeland Security Thursday named Mary Ellen Callahan as the department's Chief Privacy Officer.

Researchers detail Intel TXT hacks at Black Hat Two security researchers fleshed out details Wednesday at the Black Hat conference in Washington of a method they disclosed earlier this year for circumventing Intel's new Trusted Execution Technology (TXT) security software.

Computer thefts prompt Los Alamos security review The Los Alamos National Laboratories has launched a month-long project aimed at ensuring that offsite computer systems fully comply the institution's information security policies. Los Alamos officials are also conducting a full review of its policies and its procedures governing the use of official computers at home by employees of the laboratory.

February giveaways from Cisco Subnet and Microsoft Subnet
Up for grabs: One American Express gift card worth $250 from Global Knowledge; One Microsoft training course worth $2,995 from Global Knowledge; 15 copies each of the hot book titles Voice over IP Security, and CCNA Wireless Official Exam Certification Guide and 15 copies of Exchange Server 2007 How-To: Real Solutions for Exchange Server 2007 SP1 Administrators. Get all the entry details here.


IT & social networks
where IT pros do their social networkingSurvey takes a look at where IT pros do their social networking.

Hot spot safety tips
Top 10 hot spot safety tipsHow to protect laptop data at your local Wi-Fi hot spot.

Sponsored by Oracle
rule

IDC: Preventing Enterprise Data Leaks at the Source
This IDC report presents a preemptive approach to information protection and control (IPC). It discusses the growing internal threats to business information, the impact of government regulations on the protection of data, and how enterprises must adopt database security best practices to prevent sensitive customer data or company information from being distributed within or outside the enterprise in violation of regulatory or company policies. Review this research today.

rule

Avoid the SMB Technology Quagmire
SMBs have concrete technology needs, but it's difficult to find cost-effective, easy to manage and secure solutions. Get real-world advice on how to complete this task in this Special Briefing, "Avoiding Techno-quicksand for Small and Medium Businesses." Find out how to select the right products for your organization today.
Download this Special Briefing now.


Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies.
Download this Executive Guide now.

 

02/20/09

Today's most-read stories:

  1. Want to close your LendingTree account? Sorry, no can do
  2. Stimulus bill aims for 'national broadband plan'
  3. Accused rogue admin Terry Childs makes his case
  4. 9 dirty tricks: Social engineers' favorite pick-up lines
  5. Nortel exec issues vague promise to detail its reorganization
  6. HP cuts pay, benefits after poor financials
  7. Nortel loses bid for Verizon Wireless business
  8. Microsoft wins motion, loses one in Vista Capable case
  9. Verizon confirms details of U.S. LTE deployment
  10. CVS spanked over customer privacy failures


Compare Security Information Management Products
Get side-by-side product comparisons, buying tips, market trend information, case studies and more with Network World's newly enhanced Security Information Management Product Guide.
Visit now



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: