Search This Blog

Wednesday, January 20, 2010

Researchers up ante, create exploits for IE7, IE8

Apple patches 12 Mac bugs in Flash, SSL | Identity theft on the rise

Network World Security Alert

Forward this to a Friend >>>


Researchers up ante, create exploits for IE7, IE8
Researchers have created attack code that exploits a zero-day vulnerability in IE7 as well as in the newest IE8 -- even when Microsoft's recommended defensive measure is on. Read More


RESOURCE COMPLIMENTS OF: Palo Alto Networks

Enterprise 2.0 Apps – Block or Not?
Enterprise 2.0 applications are changing the way organizations get things done. These applications deliver significant business value but can also introduce substantial risks. What should organizations do to control these applications? It's not a simple binary decision to block or allow. Learn how to safely enable Enterprise 2.0. Learn more now.

WHITE PAPER: St. Bernard

6 Steps to Evaluating Web Filtering
Web filtering that doesn't compromise network performance is just one of the critical steps when considering this technology. This paper guides you through the pros and cons of a software-based solution vs. an appliance-based filter and advises on considerations ranging from implications of your acceptable use policy to properly authenticating individuals. Read More

Apple patches 12 Mac bugs in Flash, SSL
Apple on Tuesday patched 12 vulnerabilities in Leopard and Snow Leopard, including seven in Adobe Flash Player and one in the protocol used to secure Internet traffic. Read More

Identity theft on the rise
Identity theft has been a major and growing problem in the United States for several years. The Privacy Rights Clearinghouse, a "nonprofit consumer organization with a two-part mission -- consumer information and consumer advocacy" has an excellent survey page with pointers to years of published studies and point-form summaries of many of their findings. Read More

Brain drain; admin failures threaten FCC role
The Federal Communications Commission has brain drain and administration problems that could decrease its effectiveness at a time when advanced service technologies such as wireless and broadband present significant regulatory challenges.   Read More


WHITE PAPER: Zscaler

How Hackers are Targeting Enterprise Users via Web 2.0 Browser Exploits
Securing enterprise servers with firewalls and intrusion detection is critical, but the most common threats are executed on thousands of mobile end users through the Web. Lean how to protect your clients with more than desktop anti-virus/anti-spyware and HIPS. Learn more!

Military contractors targeted in Chinese attacks, says F-Secure
A security vendor reports that internal systems of U.S. defense contractors have been targeted by hackers believed based in China. Read More

Cloud Security Alliance Presents a Comprehensive Strategy
When it comes to hyperbole, the technology industry is at least as persistent as any other. Take Cloud Computing, the buzz term Du Jour. Is the industry hype here appropriate? Yes and no. Yes, cloud computing will play an increasing role in the future of IT but it the short-term it is more vision than reality. Case in point, ESG Research indicates that only 12% of mid-sized companies and large... Read More

Google, Facebook, and the China Syndrome
So far, 2010 has started off with a bang. Google decides to take on Apple in the ultra-smartphone market, while Apple appears on the verge of creating yet another new market for touchscreen tablet PCs. Google says "bite me" to China, after Chinese cyber attackers target it and three dozen other tech firms. Yahoo chimes in with support for Google and gets spanked by its Chinese partner, Alibaba. This story isn't going away any time soon. Read More


WHITE PAPER: ArcSight

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center

IC3 includes identity theft in statistics
Identity theft has been a major and growing problem in the United States for several years. The Privacy Rights Clearinghouse, a "nonprofit consumer organization with a two-part mission -- consumer information and consumer advocacy" has an excellent survey page with pointers to years of published studies and point-form summaries of many of their findings. Read More

Outsourcing information security
The need to keep information secure is not a recent development. Read More

Apple releases new Security Update for Leopard, Snow Leopard
Apple on Tuesday released Security Update 2010-001 for Mac OS X Snow Leopard as well as versions for both client and server releases of its predecessor, Mac OS X Leopard. These updates improve the security of Mac OS X are recommended for all users of the respective versions. Read More

Microsoft promises emergency IE patch
Microsoft today announced that it will issue an emergency security update for Internet Explorer (IE), but postponed setting a ship date for the fix until Wednesday. Read More



New look

We've revamped our newsletters so that they're cleaner, easier to read and lighter on the HTML formatting. What do you think? Let us know - and thanks for reading!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

New giveaways! Win a year's worth of 24/7 video training from ClipTraining. Win books on WS2008 R2, Cisco WAAS and the CCIE. Deadline Jan. 31. Plus: On Cisco Subnet: Cisco's borderless networking: the next big thing? On Microsoft Subnet: FreeNAS: Open Source Network Attached Storage; On Google Subnet Top 10 Open Source Rookies of the Year.

SLIDESHOWS

Gotta start somewhere
What were the first products from today's biggest tech companies? Take the quiz.

2010's 25 geekiest 25th anniversaries
Our fourth annual compilation of the current year's most notable technology-related 25th anniversaries.

MOST-READ STORIES

  1. Reports: iPhone 4G rumors heat up
  2. Verizon Wireless slashes rates for unlimited voice
  3. 40/100G Ethernet transceiver market to reach half billion
  4. IE8 limits SSL VPN options for Cisco ASA users
  5. Microsoft's Ballmer: We're staying in China
  6. Facebook unleashes lawyers on Web 2.0 Suicide Machine
  7. New BlackBerrys on the horizon
  8. Google's stance on China shatters security inhibitions
  9. Csico ASA takes on botnets
  10. EFF to public: Urge the FCC to close net neutrality 'loophole'

Network World on Twitter? You bet we are

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Update your profile | Terms of Service/Privacy

Copyright Network World, Inc., 2010

Network World, Inc.,, 492 Old Connecticut Path, Framingham, MA 01701


No comments: