Search This Blog

Wednesday, December 16, 2009

Rogue antivirus lurks behind Google Doodle searches

Bots, bombs and weird science: The wackiest stories of 2009 ; ISP-level filter trial vendor happy with results
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by Trend Micro
rule

Addressing Web Threats
Recent research among senior IT managers reveals that, although organizations are taking steps to protect against Web-related threats to the enterprise, significant vulnerabilities still exist. This white paper provides specific considerations for addressing Web security liabilities.

Read More

rule

Spotlight Story
Rogue antivirus lurks behind Google Doodle searches

In Esperanto the word is "malica." It means malicious and it's the best way of describing many of the search results Google visitors got Tuesday when the clicked on Google's front-page Doodle sketch, dedicated to Esperanto's creator. Read full story

Related News:

Bots, bombs and weird science: The wackiest stories of 2009
When hard core high-tech and humanity mix you can count on some wacky or just down-right cool things happening. What we have here is our list of 25 the wackiest stories from 2009 featuring everything from high-tech toilet battles and 1,000 mph cars to shape-shifting robots and levitating mice.

ISP-level filter trial vendor happy with results
The vendor that provided filtering products to six of the nine ISPs participating in the Federal Government's controversial ISP-level content filtering trial says the results show the technology works.

Mass. Supreme Court throws out lawsuit against BJs over '04 data breach
The Massachusetts Supreme Judicial Court affirmed a lower court ruling dismissing a lawsuit brought against by BJs dozens of credit unions over a 2004 data breach.

10 Predictions for 2010: Kaminsky and Weatherford
Curious about what's going to happen to our critical IT infrastructure in 2010? Here, IT security luminaries Mark Weatherford, CISO for California State, and Dan Kaminsky, finder of last year's DNS flaw, offer five predictions each. (The first of 2 parts).

Google Chrome bug leaks IDs of anonymous surfers
A flaw in the Google Chrome web browser that could reveal the identity of web users trying to surf anonymously, has been identified.

Hackers are defeating tough authentication, Gartner warns
Security measures such as one-time passwords and phone-based user authentication, considered among the most robust forms of security, are no longer enough to protect online banking transactions against fraud, a new report from research firm Gartner Inc. warns.

New laws complicate security efforts in 2010
Regulatory compliance will continue to influence security projects in 2010 as a slew of new security and privacy regulations go into effect, such as the federal HITECH Act.

Zero-day vulnerability threatens Adobe users
Adobe is investigating possible vulnerabilities in its Reader and Acrobat applications that could allow an attacker to execute malicious code on Windows machines and completely compromise them.

The 12 Cons of Christmas
While the risk of being hacked, conned or having sensitive information stolen is possible all through the year, most security experts agree that the holiday season brings a spike in fraudulent activity, both online and off.

Today from the Subnet communities

On Cisco Subnet: Annual revenue for Cisco TelePresence and Cisco's EMC/VMware collaboration viewed favorably; On Microsoft Subnet: Power outages cause Windows Server 2008 problems; On Google Subnet: Google claims its new URL shortening service is more secure

Network World on Twitter? You bet we are


Ethernet everywhere!
Ethernet everywhereInside planes, trains, cars and spaceships, Ethernet is a morph master. Here's a look at some of Ethernet's cooler implementations.

7 tools to ease Windows 7 rollout
Windows 7These utilities help you plan, ensure app compatibility and manage images.

When Pressing the Send Button Results In Compliance Violations
Protecting confidential data is serious business. Failure may result in fat fines and even jail time - not to mention damage to your brand. WatchGuard's easy-to-use, all-inclusive email and web secure content and threat prevention appliances offer a complete data protection solution.
Click here.


Why BI is Ripe - Now! For Businesses of Any Size.
Oracle's range of offerings to mid-size and emerging companies reflects its vision that BI and EPM solutions can be embraced by companies of all sizes.
Read Now!

 

December 16, 2009

MOST-READ STORIES

  1. Watch out Microsoft: GNOME is poised to have a killer 2010
  2. Bank's antifraud tactics stun security expert
  3. Ethernet switch cheat sheet
  4. Supreme Court to consider texting-in-workplace case
  5. From the White House to Microsoft, open source shined in '09
  6. 8 PowerPoint train wrecks
  7. What Google phone does and doesn't mean for wireless industry
  8. Oracle's pledges on MySQL are 'purely cosmetic', say critics
  9. 10 top iPhone apps for IT pros
  10. Microsoft buys Opalis to strengthen cloud management

Secure in 15 - Start with Daily Practices
Get the Secure in 15 toolkit starting with the "15 Minutes Month-at-a-Glance" calendar. McAfee will send you additional tools and tricks to stay protected around the clock.
Click here to learn more.



EMO Labs: Better Sound Through Innovation at DEMOfall 09

EMO Labs' Invisible Speaker innovation takes People's Choice Award top honors at DEMO conference.
Watch EMO Labs product launch.


 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments: