Search This Blog

Thursday, March 25, 2010

Security companies warn of uptick in new IE attack

OpenDNS reaches milestone in DNS services | U.S. said to be eyeing cybersecurity ambassador role

Network World Security

Forward this to a Friend >>>


Security companies warn of uptick in new IE attack
Criminals are stepping up their attacks leveraging an unpatched flaw in Microsoft's Internet Explorer browser, using it to install fake antivirus products and malicious back doors on victim's computers. Read More


WEBCAST: Oracle

Identity and Access Governance – What You Need to Know
Live Webcast: Wednesday, May 5th at 1pm ET/10 am PT. Oracle presents a timely event featuring the Burton Group's, Kevin Kampman, who will provide an overview of the latest technology for identity management. Get guidance on compliance, security, identity management and other topics and participate in a live Q&A. Register Today!

WHITE PAPER: Splunk

Make IT Data a Strategic Asset
This paper outlines the struggles organizations face managing silos of IT data and how, using Splunk, users are changing the way they do their jobs and elevating the role of IT in their organizations. Learn More!

OpenDNS reaches milestone in DNS services
It doesn't sound like a lot but OpenDNS's one percent of the world's market is a significant figure Read More

U.S. said to be eyeing cybersecurity ambassador role
U.S. officials are weighing the creation of an ambassador-level position for negotiating cybersecurity matters at the U.N. and for ensuring the country has a consistent international policy on the issue, according to the Wall Street Journal. Read More

Former winners defend titles at Pwn2Own hacking contest
The Pwn2Own hacking contest opens today in Vancouver where hackers will compete for thousands of dollars in prizes for exploiting secure browsers. Read More


WHITE PAPER: Websense

Essential Information Protection
Successful organizations depend upon their ability to collaborate, communicate, and share information online. This paper explains how Essential Information Protection is designed to help organizations make the most of their IT security investments. Read More

Swann launches security monitor with iPhone integration
Swann Security has announced the DVR4-2500 Security Recorder, which features iPhone streaming via the free Aplayer application. Read More

Ferocious hot chili pepper to make nasty weapons
The military in India is looking to weaponize the world's hottest chili, the bhut jolokia or "ghost pepper," according to a number of news outl Read More

Cyberattacks are 'existential threat' to U.S., FBI says
Cyberattacks are a threat to the 'very existence' of the U.S., an FBI officials told an audience at an IT trade show on Tuesday. Read More


DOWNLOAD: RIM

Free Download from RIM
BlackBerry Enterprise Server Express offers IT control and security features you can trust even for employees that choose to bring their own BlackBerry smartphones into your business. Download this free license to support up to 75 users on your existing Exchange Server. Download Now.

Data loss prevention – a priority for 2010
In the last newsletter we began a conversation with Corey Nachreiner, WatchGuard Senior Security Analyst, concerning some points in their "2010 Security Predictions," available at http://www.webtorials.com/content/2010/02/2010-security.html. Read More

E-crime reporting format draws closer to a standard
The Internet Engineering Task Force is close to approving a specification for a common format for reporting e-crime, a step taken to allow security experts to react faster to cybercrime. Read More

Firefox Fix Heads Off Font Attack
Mozilla pushed out an ahead-of-schedule fix for its Firefox browser to close a critical security hole that became public before the patch was available. Read More

FBI lists Top 10 posts in cybercriminal operations
An FBI official told a FOSE audience that cybercriminal enterprises operate much like corporations, hiring individuals with specific talents to fill out the specialized workforce. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

The Future of Big Iron
Do your IT plans include mainframes? Participate in this Aberdeen survey and see how your plans stack up to those of peers in terms of on what core applications are staying on mainframes and where the industry is headed in operating and software architecture. The goal is to get an accurate picture of the opportunity for expanded utilization, the role of 3rd-party support, and overall objectives with respect to distributed, outsourced, heterogeneous and centralized computing paradigms. Aberdeen will also establish a baseline for performance and a set of best practices for improving the efficiency and utilization of mainframe computing technologies. All survey respondents will receive a free copy of the resulting research.

Today from the Subnet communities

Massive giveaway from Cisco Subnet: 50 copies of the Cisco Press CCNP Cert Kits kits are up for grabs. Deadline March 31. NEW! 15 books on Microsoft System Center Operations Manager (OpsMgr) 2007 R2 available, too.

SLIDESHOWS

21 apps Apple doesn't want on your 3.0 iPhone
The following 21 apps today run only on jailbroken iPhones. Some may even prove precursors to features released in future Apple iPhone firmware updates.

10 geeky items you're embarrassed to admit you want
Most of us love gadgets. But there is a certain eye-popping reaction when we find a gadget that speaks to our technological selves. Owning such devices would surely be the subject of teasing from those who deny their inner geek, but it would also be the cause of more than a little envy.

MOST-READ STORIES

  1. The biggest cloud on the planet is owned by ... the crooks
  2. Can the iPhone save higher education?
  3. Five ways to beat the Great Firewall of China
  4. 10 hot data center tools
  5. 25 awesome tech products at DEMO
  6. Top U.S. domain name registrars lag on DNS security
  7. Software tracks employee Facebook, Twitter activity
  8. 21 apps Apple doesn't want on your 3.0 iPhone
  9. Lessons learned from a long IT career
  10. Dorm room, basement, garage, university lab?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: