Monday, September 19, 2005

Security vendor warns of Google-spoofing worm

========================================================================
SECURITY REPORT http://www.infoworld.com/
========================================================================
Monday, September 19, 2005

* Security vendor warns of Google-spoofing worm
* Is information technology change good?
* A software security chat with David LeBlanc
* UC Berkeley recovers stolen laptop with 98,000 names
* US industries: We take cybersecurity seriously
* Identity federation: Is it time to move now?
* Secure end points key for mobile computing
* Product Guide: Citadel Hercules 4.0 EVM Suite

-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- --
ADVERTISEMENT

IT CONSOLIDATION: BUSINESS DRIVERS, BENEFITS AND VENDOR SELECTION

The need for consolidation is a central theme present in many
IT strategies today and, as such, businesses are challenged
with the need to reduce costs, improve service offerings and
hone security levels. This IDC report identifies the benefits
of IT consolidation and highlights key points of consideration
in vendor selection.

http://newsletter.infoworld.com/t?ctl=F0C06F:3D50222

-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- --

======================================================================

SECURITY VENDOR WARNS OF GOOGLE-SPOOFING WORM

Downloaders looking for a free "Star Wars" game may instead
find themselves installing a new worm that gives them dodgy Google
search results.
http://newsletter.infoworld.com/t?ctl=F0C061:3D50222

======================================================================

IS INFORMATION TECHNOLOGY CHANGE GOOD?

If you're reading this magazine, you're probably not a
Luddite. You probably believe that technology change is inevitable and
generally also good. I bought a new PC this week that came with a
shocking two gigs of RAM, so I'm right there with you.
http://newsletter.infoworld.com/t?ctl=F0C060:3D50222

======================================================================

A SOFTWARE SECURITY CHAT WITH DAVID LEBLANC

Last week I summarized the difficulties in preventing buffer overflows in
complex software and introduced fuzzers. With multiple buffer overflows
announced every week on some of the world's most popular products,
I want to continue the discussion on the practical realities of vendors
trying to prevent them. If the biggest software companies, with their
vast resources and talent, have a hard time preventing buffer overflows,
can any complex software product be built without security flaws?
http://newsletter.infoworld.com/t?ctl=F0C05F:3D50222

-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- --
ADVERTISEMENT

IT CONSOLIDATION: BUSINESS DRIVERS, BENEFITS AND VENDOR SELECTION

The need for consolidation is a central theme present in many
IT strategies today and, as such, businesses are challenged
with the need to reduce costs, improve service offerings and
hone security levels. This IDC report identifies the benefits
of IT consolidation and highlights key points of consideration
in vendor selection.

http://newsletter.infoworld.com/t?ctl=F0C06F:3D50222

-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- --
======================================================================

UC BERKELEY RECOVERS STOLEN LAPTOP WITH 98,000 NAMES

Campus police at the University of California, Berkeley have recovered a
stolen laptop that contained information of more than 98,000 of the
school's graduate students. The laptop's hard drive had been
wiped clean of information and then sold on an Internet auction site,
making it impossible to determine whether or not the sensitive
information it had contained was ever accessed, the University said in a
statement.
http://newsletter.infoworld.com/t?ctl=F0C05C:3D50222

======================================================================

US INDUSTRIES: WE TAKE CYBERSECURITY SERIOUSLY

WASHINGTON, D.C. - While lawmakers decried a lack of concern in the U.S.
about cybersecurity issues, representatives of the electricity,
communications and other so-called critical infrastructure industries on
Thursday said they take the potential for cyberattacks seriously.
http://newsletter.infoworld.com/t?ctl=F0C05D:3D50222

======================================================================

IDENTITY FEDERATION: IS IT TIME TO MOVE NOW?

While there is high interest in identity federation, the technology is
still in flux and will likely be more expensive and time-consuming to
implement immediately rather than three years from now, an identity and
access management expert said Thursday.
http://newsletter.infoworld.com/t?ctl=F0C05E:3D50222

======================================================================

SECURE END POINTS KEY FOR MOBILE COMPUTING

Computers and mobile devices using wireless networks or other end points
by company employees are posing increasing threats to their
organizations' computer systems, although there are ways IT managers
can reduce risk, according to an analyst Thursday at the Gartner IT
Security Summit 2005 in London.
http://newsletter.infoworld.com/t?ctl=F0C05B:3D50222

======================================================================

PRODUCT GUIDE: CITADEL HERCULES 4.0 EVM SUITE

Hercules 4.0, a vulnerability management suite, audits systems for
security policy and compliance violations. The nifty Remediation Manager
aggregates and fixes problems identified by the compliance module and
third-party scanners. Includes risk analysis features to check for
dangerous configurations and calculate risk ratings so key devices get
priority remediation.

http://newsletter.infoworld.com/t?ctl=F0C05A:3D50222

======================================================================

-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- --
ADVERTISEMENT

IT CONSOLIDATION: BUSINESS DRIVERS, BENEFITS AND VENDOR SELECTION

The need for consolidation is a central theme present in many
IT strategies today and, as such, businesses are challenged
with the need to reduce costs, improve service offerings and
hone security levels. This IDC report identifies the benefits
of IT consolidation and highlights key points of consideration
in vendor selection.

http://newsletter.infoworld.com/t?ctl=F0C06F:3D50222

-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- --

======================================================================

INFOWORLD NEWSLETTERS KEEP SENIOR IT MANAGERS INFORMED
For over 25 years, InfoWorld Media Group has provided
cutting-edge coverage and evaluation of IT products and
services for technology experts in senior management.
Sign up for a free InfoWorld newsletter to gain expert
advice from our lead test center analysts on topics like
security, storage, wireless technology, and IT management.
In addition, InfoWorld now offers newsletters geared
towards IT in government, small medium business, and open
source enterprise. Click on the link below to subscribe
to a free newsletter today:
http://newsletter.infoworld.com/t?ctl=F0C063:3D50222

======================================================================

ADVERTISE

To advertise, contact Elisabeth_raphel@infoworld.com.

======================================================================

UNSUBSCRIBE/MANAGE NEWSLETTERS

To subscribe, unsubscribe or change your e-mail address for any of
InfoWorld's e-mail newsletters, go to:
http://newsletter.infoworld.com/t?ctl=F0C064:3D50222

To subscribe to InfoWorld.com, or InfoWorld Print, or both, or to
renew or correct a problem with any InfoWorld subscription, go to
http://newsletter.infoworld.com/t?ctl=F0C066:3D50222

To view InfoWorld's privacy policy, visit:
http://newsletter.infoworld.com/t?ctl=F0C065:3D50222

Copyright (C) 2005 InfoWorld Media Group.
501 Second St., San Francisco, CA 94107

This message was sent to: security.world@gmail.com

No comments:

Post a Comment