Search This Blog

Tuesday, September 29, 2009

Fighting Conficker

Security Alert - Newsletter - NetworkWorld.com
Do phishers have more poles in the water?; NASA wants your ambitious high-tech contest ideas
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by Sophos
rule

Is Anti-Virus Dead?
This paper discusses the security implications of modern threats, analyzes where emerging technologies can add real value, and highlights five key strategies for ensuring solid malware protection.

Learn more.

rule

Spotlight Story
Fighting Conficker

A lot of really good research has been published about the Conficker worm, its many forms, infection vectors and speculation as to what it's going to do next. But what seems to be missing is the operational side of fighting Conficker. What signs would you expect to see, how do you really fight it and what can you possibly do to prevent it? Read full story

Related News:

Do phishers have more poles in the water?
Are phishing attacks going up or down? The answer depends on who you ask.

NASA wants your ambitious high-tech contest ideas
NASA is looking for a few good ideas for future multi-million dollar Centennial Challenges prize competitions and this time it wants the public to provide them.

Data Destroyer Disk Wipe Ensures Your Privacy
Simply formatting a drive has never been enough to get rid of data completely; otherwise, data recovery specialists would be out of a job. That's where Data Destroyer Disk Wipe ($14, free demo) comes in. Not only does it erase data on a drive, it writes and rewrites over that data with random bytes, making the wiped data totally unrecoverable.

SMBs unprepared for disasters, Symantec finds
Small businesses shouldn't be so confident about their disaster recovery plans, survey founds.

Watching the detectives bowl
Gibbs follows on from last week's column on surveillance with a tale of cops caught on video in a house search, the state of video surveillance in the UK, and wonders if our operating systems might be rigged …

Med students' tweets, posts expose patient info
Future doctors are too frequently putting inappropriate postings and sometimes confidential patient information, on social sites like Facebook and Twitter, according to study published in the Journal of the American Medical Association.

A security evangelist shares his best practices
Anyone who has the word "evangelist" in his business title must really love his job. This week, John Linkous, Security and Compliance Evangelist at eIQnetworks shares his best practices for information security.

Special Report: Security Versus the Mob
An in-depth look at the battle against organized crime in the physical and digital worlds, from retail theft to identity theft.

Microsoft Subnet is giving away training from New Horizons and 15 copies of Windows Server 2008 How-To. Cisco Subnet is giving away 15 copies of Interconnecting Data Centers Using VPLS. Google Subnet is hosting many new bloggers (watch for giveaway information soon.) Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


Are netbooks ready for the enterprise?
NetbooksFive reasons to deploy netbooks and five reasons not to.

Demo's biggest stars ever
Demo1,500 innovators have presented at Demo. Here are the best.

Beefing up Email Security by Teaming with a Leader
Improve your email security practices after watching this Live Webcast on Wednesday, September, 30 at 1:00 p.m. ET/10:00 a.m. PT. Your email security choices extend beyond on-premise only solutions. Improve your anti-spam, visibility, content filtering and encryption support with hosted, hybrid and managed email security services.
Register for this live event now.


Sophos Security Solution Center
With the threat landscape constantly changing, you need to have comprehensive protection that isn't complicated. With Sophos, you get complete protection for less investment. You get best-in-class threat protection, and data security and compliance that are simple and affordable so you can get more out of your existing security budget. Review timely resources at this Solution Center.
Visit this site today!

 

September 29, 2009

MOST-READ STORIES

  1. Cell towers that blend vs. those that offend
  2. Microsoft, researchers release new operating system project
  3. Xerox will buy ACS for $6.4 billion
  4. AT&T accuses Google of violating telecom law
  5. To fight worms, use ants
  6. Judge berates Apple over Snow Leopard timing in Psystar case
  7. What to do about bandwidth hogs?
  8. Citrix planning major desktop virtualization push
  9. John Chambers slams Cisco with $2.3 million in private jet expenses
  10. Lotus goes after Microsoft's 'ridiculous and fabricated' figures

Managed Security for a Not-So-Secure World
Today's risky data environment, which has seen 213 data breaches in the first five months of 2009, is colliding with an IT landscape of shrinking resources. This paper explains how an IT and security service provider can provide a practical, manageable and reliable solution.
Read More



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments: