Search This Blog

Wednesday, May 20, 2009

Web attack that poisons Google results gets worse

Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Tripwire, Inc.
rule

Know the IT Metrics That Matter
Read this recent benchmark study by the IT Process Institute (ITPI). Discover specific controls and measurements that prove significant to overall IT performance. In this timely whitepaper learn about foundational IT controls, the four metrics that matter most, and the ROI of implementing a culture of change management and causality. Get these facts today.

rule

Spotlight Story
Web attack that poisons Google results gets worse

Robert McMillan By Robert McMillan
A new attack that peppers Google search results with malicious links is spreading quickly, the U.S. Computer Emergency Readiness Team warned on Monday. Read full story

Related News:

iPhone security, Part 1
Perhaps the biggest security problem of mobile phones is that they are easily lost or stolen. Unless a lost/stolen phone has been protected (by its rightful owner) from unauthorized use, then anyone who finds this phone could, in theory, access it with the same rights and privileges as the original owner. But what are the security issues when the phone stays in the possession of its rightful owner? This article considers just one popular case: The Apple iPhone, although most of what applies to iPhones also applies to a related Apple product, the iPod touch.

Once upon a time, gadgets in bed meant kinky not nerdy
Survey results out this morning are not exactly shocking in that they show smart phones and laptops have joined bread crumbs and toenail clippings as a major source of marital friction in the bedroom. But maybe some of this should be shocking. Almost half the respondents (44%) admitted they are holding important work documents on their mobile devices of which 54% were not adequately secured with encryption. ... Additionally snooping neighbors or even malicious infiltrators could hack into the devices that are being used in bed, as a fifth of people are not using a secure wireless network as they busily tap away under their duvets.

Arbor adds ATLAS capabilities to latest Peakflow edition
Network security vendor Arbor Networks has integrated its ATLAS Internet monitoring system into the latest edition of its Peakflow security system. Arbor's Peakflow SP 5.0 aggregates and analyzes data to provide network operators with information on network behavioral attack patterns from threats such as botnet sites, phishing sites and worms.

Cloud management wares on display at Interop; Security budgets shrinking, survey says
A handful of vendors this week at Interop are debuting new and upgraded products designed to help monitor application performance and IT service delivery in cloud computing environments. Also, a new survey of information security officers in the high-tech, media and telecom sectors shows that 32% are facing reduced information security budgets.


Evolution of Ethernet
Evolution of Ethernet From 3Mbps over shared coax to 40/100Gbps over fiber…and beyond.

Apple iPhoneys: The 4G edition
Apple iPhoneys: The 4G editioniPhone enthusiasts from around the Web offer their visions for the next-gen iPhone.

Sponsored by Tripwire, Inc.
rule

Know the IT Metrics That Matter
Read this recent benchmark study by the IT Process Institute (ITPI). Discover specific controls and measurements that prove significant to overall IT performance. In this timely whitepaper learn about foundational IT controls, the four metrics that matter most, and the ROI of implementing a culture of change management and causality. Get these facts today.

rule

Metzler: 2009 Handbook of Application Delivery
Successful IT organizations must know how to make the right application delivery decisions in these tough economic times. This handbook authored by WAN expert Jim Metzler will help guide you.
Download now


Everybody says "Do more with less!"
But no one tells you how. We will and it costs nothing to find out at IT Roadmap Conference and Expo. Coming to 10 cities in 09.
Register now, attend free

 

05/20/09

Today's most-read stories:

  1. Web attack that poisons Google results gets worse
  2. New DNS bug and fix announced
  3. Inside the bad-ass world of military research projects
  4. Cisco unveils a grab bag of wireless LAN products
  5. NDC: Cloud computing
  6. Slideshow: Products to be shown at Interop
  7. Free tools help protect users from IIS zero-day exploit
  8. Sprint CEO preaches patience at JP Morgan tech conference
  9. HP claims Cisco 'alternative' mantle
  10. Nortel continues the enterprise fight


Network World on Twitter: Get our tweets and stay plugged in to networking news


EMA: Refining privilege access security.
Close the security gaps in high-privilege access control and authentication by selecting the right security products for the job. This whitepaper, "Resolving the Privilege Management Paradox," details how. EMA outlines how to find products that offer strong shared access management, better control and clear visibility and multifactor authentication.
Click to download.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: