Search This Blog

Tuesday, November 08, 2005

Check employees' home computers for threats to your network

NETWORK WORLD NEWSLETTER: MICHAEL OSTERMAN ON MESSAGING
11/08/05
Today's focus: Check employees' home computers for threats to
your network

Dear security.world@gmail.com,

In this issue:

* Lessons from across the pond
* Links related to Messaging
* Featured reader resource
_______________________________________________________________
This newsletter is sponsored by SunGard

When e-mail is down, you can pretty much count on the fact that
it won't be business as usual. Learn how to maintain access to
e-mail without missing a beat. And if regulatory compliance or
restoration is a top of mind concern--you'll be prepared.
http://www.fattail.com/redir/redirect.asp?CID=118769
_______________________________________________________________
INDUSTRY GROUP PLANS VOIP BEST PRACTICES

The potential threats to VoIP networks are many and include:
theft of service, spamming, intentional disruption of services,
number harvesting and more. An industry group is working toward
a best-practices document that will spell out for businesses how
to build secure VoIP networks using specific makes and models of
equipment. More:
http://www.fattail.com/redir/redirect.asp?CID=119269
_______________________________________________________________

Today's focus: Check employees' home computers for threats to
your network

By Michael Osterman

In late October, I had the privilege of participating at the
Message05 event in London, an event focused on the e-mail
industry in the U.K and beyond. One of the more interesting
parts of this conference was the roundtable discussions in which
vendors, IT managers and others were given 90 minutes to kick
around a variety of issues - the two I led were focused on
content security and e-mail hygiene. Here are a couple of the
more interesting takeaways from the conference:

* One of the U.K.'s largest employers recently experienced a
major incident that brought its e-mail system and the rest of
its network to a complete halt for three days. It took a full
four weeks for all of the servers to be patched. At the time of
the conference, the company's IT management still didn't know
what caused the outage - it could have been anything from an IM
worm to a virus brought in on a USB keychain device. The company
has spent enormous sums of money combating the effects of
whatever caused the outage and reinforcing its defenses to
prevent something else like this from happening again.

* When Volvo negotiates with security vendors for new systems,
the company requires that its employees are provided with the
same desktop capabilities for use at home. Volvo's thinking is
that because a lot of its employees do work from home, it's
critical to make sure that threats cannot enter the corporate
network by way of users' personal machines.

Both of these points illustrate the critical need for
organizations of all sizes to focus on a wide and growing array
of threats that could easily impact their networks. A single
piece of code, for example, one that could bring down a network
for days, can enter through an e-mail, an image file embedded in
an e-mail, a single IM, a USB keychain device, a diskette, an
employee's laptop, an employee's home machine, a contractor's
machine, an employee's child or any of a variety of other
sources. It is critical, therefore, to protect every avenue by
which a threat could enter a network, not just those in the
workplace.

The top 5: Today's most-read stories

_______________________________________________________________
To contact: Michael Osterman

Michael D. Osterman is the principal of Osterman Research
<http://www.ostermanresearch.com/>, a market research firm that
helps organizations understand the markets for messaging,
directory and related products and services. He can be reached
by clicking here <mailto:michael@ostermanresearch.com>
_______________________________________________________________
This newsletter is sponsored by SunGard

When e-mail is down, you can pretty much count on the fact that
it won't be business as usual. Learn how to maintain access to
e-mail without missing a beat. And if regulatory compliance or
restoration is a top of mind concern--you'll be prepared.
http://www.fattail.com/redir/redirect.asp?CID=118768
_______________________________________________________________
ARCHIVE LINKS

Archive of the Messaging newsletter:
http://www.networkworld.com/newsletters/gwm/index.html
_______________________________________________________________
FEATURED READER RESOURCE

WHO'S IN THE HOT SEAT?

Now available on NetworkWorld.com is Network World's Hot Seat
with John Gallant. Guests on the Hot Seat, which include vendor
executives and industry luminaries, give candid answers to
pointed questions. These 5-minute video clips are sure to keep
you informed and entertained. Click here to see who is in this
week's Hot Seat:

<http://www.networkworld.com/nlmsg10753>
_______________________________________________________________
May We Send You a Free Print Subscription?
You've got the technology snapshot of your choice delivered
at your fingertips each day. Now, extend your knowledge by
receiving 51 FREE issues to our print publication. Apply
today at http://www.subscribenw.com/nl2

International subscribers click here:
http://nww1.com/go/circ_promo.html
_______________________________________________________________
SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World e-mail
newsletters, go to:
<http://www.nwwsubscribe.com/Changes.aspx>

To change your e-mail address, go to:
<http://www.nwwsubscribe.com/ChangeMail.aspx>

Subscription questions? Contact Customer Service by replying to
this message.

This message was sent to: security.world@gmail.com
Please use this address when modifying your subscription.
_______________________________________________________________

Have editorial comments? Write Jeff Caruso, Newsletter Editor,
at: <mailto:jcaruso@nww.com>

Inquiries to: NL Customer Service, Network World, Inc., 118
Turnpike Road, Southborough, MA 01772

For advertising information, write Kevin Normandeau, V.P. of
Online Development, at: <mailto:sponsorships@nwfusion.com>

Copyright Network World, Inc., 2005

Saturday, November 05, 2005

WBCSD groups Virus Alert

The following message sent by this account has violated system policy:

From: debian-firewall@lists.debian.org
To: leave-wbcsd-sl-21297b@group.wbcsd.org
Date: Sun, 06 Nov 2005 02:59:41 +0100
Subject: Mail Delivery (failure leave-wbcsd-sl-21297b@group.wbcsd.org)

The following violations were detected:

--- Scan information follows ---

Virus Name: W32.Netsky.P@mm
File Attachment: message.scr
Attachment Status: deleted

--
To UNSUBSCRIBE, email to debian-firewall-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org

Friday, November 04, 2005

Receive a FREE HYIP Script!


http://www.xyzdoubler.com/?tydog22

XYZ Doubler-Brand New Cash Doubler!
FOR LIMITED TIME ONLY RECEIVE A FREE E-GOLD HYIP SCRIPT WITH PURCHASE OF
$10 OR MORE!!

Need more e-gold/stormpay?

Get In Early While Its HOT!
Join this brand new cash doubler and double your money in 1 day!
A great way to earn some extra cash on the side!
Simple but brilliant way of doubling your investment!

http://www.xyzdoubler.com/?tydog22

--
To UNSUBSCRIBE, email to debian-firewall-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org

Barracuda targets anti-spam appliance at big enterprises

All the week's news and views about fighting spam, 11/04/05
_______________________________________________________________
This newsletter is sponsored by Altiris, Inc.
Proving the Value of IT: Reduce the Cost and Complexity of IT
Management

Register for this complimentary Webinar to learn how effective
implementation of lifecycle management can help IT reduce
operational costs, increase operational efficiencies and set the
foundation for future growth--all proof points for IT's value to
the company. Attendees may win an iPod nano! Click below to
register.
http://www.fattail.com/redir/redirect.asp?CID=119183
_______________________________________________________________
IS ONLINE BANKING SECURE?

The Federal Financial Institutions Examination Council (FFIEC )
said the industry needs to adopt more than just single-factor
authentication for online banking. The FFIEC says it considers
single-factor authentication alone "to be inadequate...." Will
online banking now require hardware tokens or biometrics? Click
here for more:
http://www.fattail.com/redir/redirect.asp?CID=118520
_______________________________________________________________

Network World's Anti-spam News Alert

Barracuda targets anti-spam appliance at big enterprises,
11/03/05

Barracuda earlier this week released a version of its Spam
Firewall e-mail security appliance for very large enterprises.
<http://www.networkworld.com/nlantispamnewsal10530>

Opinion: Blogging not all blah-blah-blah, 10/31/05

There's more happening with corporate blogs than the
career-threatening blunders that tend to grab headlines and
amuse us all.
<http://www.networkworld.com/nlantispamnewsal10531>

The top 5: Today's most-read stories

1. Cisco warns holes in IOS, WLAN and IPS gear
<http://www.networkworld.com/nlantispamnewsal10532>
2. Sprint, cable companies go for quadruple play
<http://www.networkworld.com/nlantispamnewsal10533>
3. Microsoft moves to add VoIP to Office
<http://www.networkworld.com/nlantispamnewsal10534>
4. AT&T: Fall of an icon
<http://www.networkworld.com/news/2005/103105-att.html?t5>
5. Cisco in space
<http://www.networkworld.com/nlantispamnewsal10535>

_______________________________________________________________
To contact:

Contact Online News Editor Jeff Caruso at
<mailto:jcaruso@nww.com>
_______________________________________________________________
This newsletter is sponsored by ProCurve Networking by HP
Network World Executive Guide: Compliance can be an opportunity
for Network Improvements

Federal regulations such as the Health Insurance Portability and
Accountability Act and the Sarbanes-Oxley Act are driving
increased corporate spending on key IT areas such as security,
authentication, access control and document management. Get
advice from experts. Read about real-world tactics. Learn about
the dark side of compliance: what happens when thing wrong.
And, how mandates are affecting IT budgets.
http://www.fattail.com/redir/redirect.asp?CID=118835
_______________________________________________________________
ARCHIVE LINKS

Spam/Phishing news page Latest anti-spam news, analysis and
newsletters http://www.networkworld.com/topics/spam.html
_______________________________________________________________
FEATURED READER RESOURCE

REVISTING SPYWARE

Spyware can kill your business quicker than spam or viruses.
Spyware insidiously logs your keystrokes, rifles through your
files for password and credit card data, peppers your screen
with ads and slows your PCs to a crawl. So how do you stop it?
Network World reviews 16 spyware stopping products. Click here:

<http://www.networkworld.com/nlantispamnewsal10536>
_______________________________________________________________
May We Send You a Free Print Subscription?
You've got the technology snapshot of your choice delivered
at your fingertips each day. Now, extend your knowledge by
receiving 51 FREE issues to our print publication. Apply
today at http://www.subscribenw.com/nl2

International subscribers click here:
http://nww1.com/go/circ_promo.html
_______________________________________________________________
SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World e-mail
newsletters, go to:
<http://www.nwwsubscribe.com/Changes.aspx>

To change your e-mail address, go to:
<http://www.nwwsubscribe.com/ChangeMail.aspx>

Subscription questions? Contact Customer Service by replying to
this message.

This message was sent to: security.world@gmail.com
Please use this address when modifying your subscription.
_______________________________________________________________

Have editorial comments? Write Jeff Caruso, Newsletter Editor,
at: <mailto:jcaruso@nww.com>

Inquiries to: NL Customer Service, Network World, Inc., 118
Turnpike Road, Southborough, MA 01772

For advertising information, write Kevin Normandeau, V.P. of
Online Development, at: <mailto:sponsorships@nwfusion.com>

Copyright Network World, Inc., 2005

Wednesday, November 02, 2005

Mailbag: Fixed, mobile systems live together in harmony

NETWORK WORLD NEWSLETTER: STEVE TAYLOR AND LARRY HETTICK ON
CONVERGENCE
11/02/05
Today's focus: Mailbag: Fixed, mobile systems live together in
harmony

Dear security.world@gmail.com,

In this issue:

* Readers reply to fixed vs. mobile debate
* Links related to Convergence
* Featured reader resource
_______________________________________________________________
This newsletter is sponsored by Cisco Systems
Benefits of Cisco IP Communications in a Cisco Intelligent
Network

Organizations that chose the all-IP option face another choice:
whether to run IP Communications applications from one vendor on
a different vendor's infrastructure, or chose IP Communications
from the same vendor that built the infrastructure. This paper
highlights the features that customers gain when deploying Cisco
IP Communications in an intelligent Cisco IP network. It also
demonstrates the unique value that this systems approach
delivers.
http://www.fattail.com/redir/redirect.asp?CID=118728
_______________________________________________________________
SIGN UP FOR 51 FREE ISSUES OF NETWORK WORLD MAGAZINE

Everyone is talking about the convergence of voice and data onto
the same infrastructure. Convergence touches on virtually every
aspect of the network, from the call center to the wireless LAN.
Find out what Network World Editors have to say each week in our
print publication.
SUBSCRIBE NOW AT:
http://www.fattail.com/redir/redirect.asp?CID=118568
_______________________________________________________________

Today's focus: Mailbag: Fixed, mobile systems live together in
harmony

By Steve Taylor and Larry Hettick

Last week, we published a mock debate on the virtues of fixed
vs. mobile solutions
http://www.networkworld.com/nlconvergence9799. Today, we'd like
to share a few reader replies to our discussion.

First, we'll hear from David J. Green, senior Internet marketing
and security consultant at NetGreen Consulting. Green has
succinctly answered the debate with a matrix approach,
suggesting that wireline services (just barely) edge out
wireless solutions for enterprise applications.

He suggests that, "whoever can provide 'good enough' service
that is fast, cheap and easy to use will win."

Green's matrix is shown below, using a scale of 1-5 with 5 being
high:

Good enough: Wireless-3, Wireline-4
Fast: Wireless-2, Wireline-4
Cheap: Wireless-3, Wireline-2
Easy to use: Wireless-4 Wireline-3

Totals: Wireless-12 Wireline-13

Next, we hear from Madhusudhan Mendu, who states, "My opinion is
it all depends on the business need."

Mendu suggests that the both wireline and wireless services will
"complement each other." In one example, he notes that mobile
"backhaul still needs wireline connectivity" and that "end users
[still need] wireline broadband access." In another example, he
cites a sales representative's need for "mobile connectivity for
access to his CRM system on his mobile device while on the move"
vs. the "end user who requires larger screen/intense application
like IPTV [that] will choose wireline broadband access."

As a parallel, he asks: "Did watches replaced clocks?" or "Did
cell phones replace desk phones?" - concluding that in both
cases neither solution displaced the other, and that both
continue to exist as complementary solutions.

The top 5: Today's most-read stories

1. Vulnerable security algorithms raise concerns
http://www.networkworld.com/nlconvergence10163
2. Gates, Ozzie go 'Live' with Microsoft services plan
http://www.networkworld.com/nlconvergence10164
3. Telecom merger approvals get mixed reviews
http://www.networkworld.com/nlconvergence10165
4. AT&T: Fall of an icon
http://www.networkworld.com/news/2005/103105-att.html?t5
5. FCC okays telecom mergers with conditions
http://www.networkworld.com/nlconvergence10166

_______________________________________________________________
To contact: Steve Taylor and Larry Hettick

Steve Taylor is president of Distributed Networking Associates
and publisher/editor-in-chief of Webtorials. For more detailed
information on most of the topics discussed in this newsletter,
connect to Webtorials http://www.webtorials.com/, the premier
site for Web-based educational presentations, white papers, and
market research. Taylor can be reached at
mailto:taylor@webtorials.com

Larry Hettick is an industry veteran with more than 20 years of
experience in voice and data. He is Vice President for Telecom
Services and Infrastructure at Current Analysis, the leading
competitive response solutions company. He can be reached at
mailto:lhettick@currentanalysis.com
_______________________________________________________________
This newsletter is sponsored by Cisco Systems
Benefits of Cisco IP Communications in a Cisco Intelligent
Network

Organizations that chose the all-IP option face another choice:
whether to run IP Communications applications from one vendor on
a different vendor's infrastructure, or chose IP Communications
from the same vendor that built the infrastructure. This paper
highlights the features that customers gain when deploying Cisco
IP Communications in an intelligent Cisco IP network. It also
demonstrates the unique value that this systems approach
delivers.
http://www.fattail.com/redir/redirect.asp?CID=118727
_______________________________________________________________
ARCHIVE LINKS

Archives of the Convergence newsletter:
http://www.networkworld.com/newsletters/converg/index.html
_______________________________________________________________
FEATURED READER RESOURCE

REVISTING SPYWARE

Spyware can kill your business quicker than spam or viruses.
Spyware insidiously logs your keystrokes, rifles through your
files for password and credit card data, peppers your screen
with ads and slows your PCs to a crawl. So how do you stop it?
Network World reviews 16 spyware stopping products. Click here:

http://www.networkworld.com/nlconvergence10167
_______________________________________________________________
May We Send You a Free Print Subscription?
You've got the technology snapshot of your choice delivered
at your fingertips each day. Now, extend your knowledge by
receiving 51 FREE issues to our print publication. Apply
today at http://www.subscribenw.com/nl2

International subscribers click here:
http://nww1.com/go/circ_promo.html
_______________________________________________________________
SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World e-mail
newsletters, go to:
http://www.nwwsubscribe.com/Changes.aspx

To change your e-mail address, go to:
http://www.nwwsubscribe.com/ChangeMail.aspx

Subscription questions? Contact Customer Service by replying to
this message.

This message was sent to: security.world@gmail.com
Please use this address when modifying your subscription.
_______________________________________________________________

Have editorial comments? Write Jeff Caruso, Newsletter Editor,
at: mailto:jcaruso@nww.com

Inquiries to: NL Customer Service, Network World, Inc., 118
Turnpike Road, Southborough, MA 01772

For advertising information, write Kevin Normandeau, V.P. of
Online Development, at: mailto:sponsorships@nwfusion.com

Copyright Network World, Inc., 2005

Tasman aims at beating Cisco with lower-cost router

 

All the week's Cisco news and analysis, 11/02/05


This newsletter is sponsored by Lancope

Discover the security benefits of NetFlow
Learn how Cisco NetFlow enables cost-effective security across distributed enterprise networks. StealthWatch, the Network Behavior Anomaly Detection solution, leverages NetFlow to offer Infrastructure IPS and provide real-time intelligence about network operations and devices to cost-effectively identify, prioritize and control network behavior. Click here to download ?Enterprise Network Security Doesn?t End with IPS? Whitepaper and discover the security benefits of NetFlow.


IS ONLINE BANKING SECURE?
The Federal Financial Institutions Examination Council (FFIEC) said the industry needs to adopt more than just single-factor authentication for online banking. The FFIEC says it considers single-factor authentication alone "to be inadequate...." Will online banking now require hardware tokens or biometrics? Click here for more.


Network World's Cisco News Alert

Tasman aims at beating Cisco with lower-cost router, 10/31/05

Tasman Networks this week will debut a router line aimed at matching Cisco's Integrated Services Routers on performance and beating them on price.

The top 5: Today's most-read stories

1. Vulnerable security algorithms raise concerns
2. Gates, Ozzie go 'Live' with Microsoft services plan
3. Telecom merger approvals get mixed reviews
4. AT&T: Fall of an icon
5. FCC okays telecom mergers with conditions


To contact:

Senior Editor Phil Hochmuth covers Cisco for Network World. Reach him at phochmuth@nww.com.


This newsletter is sponsored by Lancope

Discover the security benefits of NetFlow
Learn how Cisco NetFlow enables cost-effective security across distributed enterprise networks. StealthWatch, the Network Behavior Anomaly Detection solution, leverages NetFlow to offer Infrastructure IPS and provide real-time intelligence about network operations and devices to cost-effectively identify, prioritize and control network behavior. Click here to download ?Enterprise Network Security Doesn?t End with IPS? Whitepaper and discover the security benefits of NetFlow.


ARCHIVE LINKS


FEATURED READER RESOURCE

IT PROS SHARE THEIR TALES OF MAKING ITIL WORK
Running an enterprise network is challenging. IT organizational change can be even more so if managers don't balance efforts proportionally across people, process and technology. Implementing best practices frameworks such as Information Technology Infrastructure Library (ITIL) can help, but they introduce their own set of challenges. Click here for more:


COMPLIMENTARY SUBSCRIPTIONS AVAILABLE
Sign up today and receive 51 issues of Network World Magazine - At no cost

International Subscribers click here


SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World e-mail newsletters, click here.

To unsubscribe from promotional e-mail, click here.

To change your e-mail address, click here.

Subscription questions? Contact Customer Service by replying to this message.

This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription.


Have editorial comments? Write Jeff Caruso, Newsletter Editor, at: jcaruso@nww.com

Inquiries to: NL Customer Service, Network World, Inc., 118 Turnpike Road, Southborough, MA 01772

For advertising information, write Kevin Normandeau, V.P. of Online Development, at: sponsorships@nwfusion.com

Copyright Network World, Inc., 2005

Vulnerable security algorithms raise concerns

All the week's news and views about Security, 11/02/05


This newsletter is sponsored by ConSentry

Implement Network Access Controls without a costly Network Upgrade
The ConSentry Secure LAN Controller enables organizations to enact strict network access controls plus enforce network use policies on a per user or per application basis for a more secure LAN without the complexity and the cost of switch upgrades. Click
here for more information.


IS ONLINE BANKING SECURE?
The Federal Financial Institutions Examination Council (FFIEC) said the industry needs to adopt more than just single-factor authentication for online banking. The FFIEC says it considers single-factor authentication alone "to be inadequate...." Will online banking now require hardware tokens or biometrics? Click
here for more.


Network World's Security News Alert

Vulnerable security algorithms raise concerns, 11/01/05
Industry experts agree that the future of two widely used security algorithms is fated, but with no clear alternatives in sight products that rely on them may have to remain "good enough" for some time.

Worm with rootkit hits AOL chat service, 11/01/05
Links leading to a worm that eventually implants a nasty rootkit on a user's computer are popping up on America Online's (AOL's) Instant Messenger network, security researchers are reporting.

Sourcefire may resurrect Check Point, 10/31/05
Sourcefire has products, but they're missing pieces - things that Check Point does very well. And Sourcefire can certainly benefit from the mature marketing, distribution, quality assurance and support infrastructure of an established company such as ...

The scary side of recycling hard drives, 10/31/05
I had been generally aware that far too many disks that government agencies, enterprises and individuals sell or trade in when upgrading their systems still contain valuable information, but I did not know the extent of the problem.

Spyware: Risky Business?, 10/31/05
The security industry has had a hard time even defining "spyware," much less stamping it out. All manner of annoying adware and malicious programs, such as keyloggers and botnets, are getting crammed into the single term "spyware." But a group called ...

Anti spyware in Vista, 10/31/05
If you are keeping score on what is in and what is out of Microsoft's Vista operating system (and for the record Microsoft says the feature list is not set) the newest addition in anti-spyware, the now standalone tool Microsoft got in its acquisition ...

Start-up takes aim at online prevention, 10/31/05
Business Signatures last week unveiled software aimed at helping financial institutions curb online fraud.

The top 5: Today's most-read stories

1. Vulnerable security algorithms raise concerns
2.
Gates, Ozzie go 'Live' with Microsoft services plan
3.
Telecom merger approvals get mixed reviews
4.
AT&T: Fall of an icon
5.
FCC okays telecom mergers with conditions


To contact:

Senior Editor Ellen Messmer covers security for Network World. Contact her at emessmer@nww.com.


This newsletter is sponsored by ConSentry

Implement Network Access Controls without a costly Network Upgrade
The ConSentry Secure LAN Controller enables organizations to enact strict network access controls plus enforce network use policies on a per user or per application basis for a more secure LAN without the complexity and the cost of switch upgrades. Click
here for more information.


ARCHIVE LINKS


FEATURED READER RESOURCE

IT PROS SHARE THEIR TALES OF MAKING ITIL WORK
Running an enterprise network is challenging. IT organizational change can be even more so if managers don't balance efforts proportionally across people, process and technology. Implementing best practices frameworks such as Information Technology Infrastructure Library (ITIL) can help, but they introduce their own set of challenges. Click here for more:


COMPLIMENTARY SUBSCRIPTIONS AVAILABLE
Sign up today and receive 51 issues of Network World Magazine - At no cost

International Subscribers click here


SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World e-mail newsletters, click here.

To unsubscribe from promotional e-mail, click here.

To change your e-mail address, click here.

Subscription questions? Contact Customer Service by replying to this message.

This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription.


Have editorial comments? Write Jeff Caruso, Newsletter Editor, at: jcaruso@nww.com

Inquiries to: NL Customer Service, Network World, Inc., 118 Turnpike Road, Southborough, MA 01772

For advertising information, write Kevin Normandeau, V.P. of Online Development, at: sponsorships@nwfusion.com

Copyright Network World, Inc., 2005