Search This Blog

Thursday, July 05, 2007

Apple patches audio bug

Network World

Virus and Bug Patch Alert




Network World's Virus and Bug Patch Alert Newsletter, 07/05/07

Apple patches audio bug

By Jason Meserve

Today's bug patches and security alerts:

Apple patches audio bug

Apple Monday issued a fix for the "snap, crackle, pop" audio problem that has bedeviled some Macintosh users since the June 20 operating system update to Mac OS 10.4.10. Tagged as "Audio Update 2007-001," the 660KB download targets all Intel-powered Macs, said Apple. "[This] addresses an issue with version 1.0 of the Mac OS X 10.4.10 Update in which a 'popping' sound might be heard with some external speakers on Intel-based Macs," said Apple in the update's online notice. Macs equipped with the older PowerPC processors don't need to install this update, Apple said. Computerworld, 07/02/07.

Network World Security Buyers Guide

Find the right security products for your enterprise - fast. From anti-spam to wireless LAN security, our Buyers Guides have detailed information on hundreds of products in more than 20 categories. With the side-by-side comparison tool you can evaluate product features to make the best decision for your enterprise.

Click here to go to the Security Buyers Guide now.

Apple advisory

**********

Three new updates from Gentoo:

Firebird (buffer overflow, code execution)

OpenOffice.org (multiple flaws)

GNU C Library (integer overflow, code execution)

**********

Three new updates from Debian:

fireflier-server (non-secure temp files)

gsambad (non-secure temp files, code execution)

unicon-imc2 (buffer overflow, code execution)

**********

Today's malware news:

IPhone scams ramp up, target overeager buyers

Using the buzz surrounding last Friday's launch of the iPhone, hackers and scammers are targeting eager would-be buyers to launch their latest attacks. Computerworld, 07/04/07.

4th of July and Greeting Cards

As today is the 4th of July - Independence Day in the United States, it wasn't a big surprise that there has been lots of malicious 4th of July greeting cards going around. They work exactly the same way as the other greeting cards and the ones we've seen have all been using IP addresses for the clickable link. Again, stay away from them. F-Secure blog, 07/04/07.

When Spambots Attack -- Each Other!

So, you've read plenty about when botnets attack. You've also seen plenty about when spambots attack, though it's usually only in the form of spam email flooding in the course of spambot offspring performing the functions for which their creator intended. There's even been plenty of press about when Botnets Battle Over Turf, attacking each other. So, let's delve into one example of why that is, and take a terse look at one such set of attacks. Security to the Core blog, 07/01/07.

**********

From the interesting reading department:

Is securing your network worth the money?

Security researchers detail P2P threats, vulnerability disclosures and hacker profiling at recent Carnegie Mellon confab. NetworkWorld.com, 07/03/07.

Fidelity National: Ex-worker stole 2.3 million customer records

Fidelity National Information Services, a financial-processing company, said today a senior-level database administrator at one of its subsidiaries stole 2.3 million consumer records containing credit card, bank account and other personal information. Network World, 07/03/07.

Organized, financially driven online criminals a main corporate threat, IBM security exec says

Director of IBM Internet Security Systems Kris Lamb says online criminals are focusing on highly repeatable, highly undetectable types of attacks using bots and malware. NetworkWorld.com, 07/03/07.

15 great, free security programs

From the moment you switch on your PC, your system faces countless Internet-borne dangers, including spyware attacks, viruses, Trojan horses, home-page hijackers, and hackers trying to weasel their way into your system. And the Internet isn't the only source of trouble. Anyone with access to your PC can invade your privacy by prying into which Web sites you visit--and learning a great deal more as well. PC World, 07/02/07.

Consumer devices pose threat to enterprise security

As more consumer technologies make their way to the enterprise, Gartner advises IT leaders to prepare to manage the additional security risks. Your security managers should consider deploying network access control (NAC) or content management filtering (CMF)/data loss prevention (DLP) to minimize threats. Network World, 07/03/07.

Hackers target C-level execs and their families

Hackers appear to have stepped up their efforts to trick corporate executives into downloading malicious software programs that can steal company data over the past year, according to new data released Monday. IDG News Service, 07/02/07.

Salary survey: Be a CSO and get rich

CSOs are seeing the most significant increases in pay this year, while IT professionals in general are experiencing minor increases in compensation, according to a new survey. NetworkWorld.com, 07/02/07.

Opinion: An invisible abomination

ISPs spying on customers’ Internet activities, inserting ads in Web pages. Network World, 07/02/07.


  What do you think?
Post a comment on this newsletter

TODAY'S MOST-READ STORIES:

1. iPhone launches and AT&T EDGE goes down
2. Hackers make progress towards unlocking iPhone
3. Top 25 'iPhonies'
4. The $2.3M home lab of Quadruple CCIE
5. The 7 Wonders of the Internet
6. Salary survey: Be a CSO and get rich
7. Lawyers show how to avoid hiring an American
8. iPhone buzz reaches to Microsoft's back yard
9. 10 things Apple did right and wrong with the iPhone
10. SAP admits to 'some inappropriate downloads'

MOST READ REVIEW:
Using Microsoft's OCS as a unified messaging platform


Contact the author:

Jason Meserve is Network World's Multimedia Editor and writes about streaming media, search engines and IP Multicast. Check out his Multimedia Exchange Weblog.

Check out Jason Meserve and Keith Shaw's weekly podcast "Twisted Pair"



ARCHIVE

Archive of the Virus and Bug Patch Alert Newsletter.


BONUS FEATURE

IT PRODUCT RESEARCH AT YOUR FINGERTIPS

Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details.


PRINT SUBSCRIPTIONS AVAILABLE
You've got the technology snapshot of your choice delivered to your inbox each day. Extend your knowledge with a print subscription to the Network World newsweekly, Apply here today.

International subscribers, click here.


SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription.


Advertising information: Write to Associate Publisher Online Susan Cardoza

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772

Copyright Network World, Inc., 2007

No comments: