Wednesday, July 11, 2007

Who's to blame for browser bug? IE or Firefox?; 6 ways to secure mobile devices

Network World

Security News Alert




Network World's Security News Alert, 07/11/07

Who's to blame for browser bug? IE or Firefox?, 07/11/07: A security researcher has found a security bug that could be attacked in Internet Explorer. Mozilla said it plans to patch the problem in its next Firefox software update.

Podcast: 6 ways to secure mobile devices: Reports say that 40% of enterprises have no policies in place regarding mobile security. Keith Shaw talks with John Jefferies, VP of marketing at RedCannon Security, about RedCannon's Six Laws of Mobile Security, a new framework for how enterprises can use mobile security best practices to protect private data yet still enable the use of mobile devices. (13:25)

Phishing tool constructs new sites in two seconds, 07/10/07: Software developers like to make installation of their programs simple and quick. So do hackers.

Manage Insider Security Threats

Experts say 75% of security threats come from inside your organization. Watch the latest Network World Editorial Perspectives Webcast today, "Security From the Inside," and learn which technologies and processes best protect your intellectual property and assets inside the perimeter.

Click Here to View

EEye: Sun update system exposes users, 07/10/07: Sun is putting millions of Java users at risk by staggering the release of security patches for the software, security vendor eEye Digital Security said Monday.

Identity theft, personal bankruptcies and you: Cisco Subnet blogger Mark Kadrich explains how identity theft has led to some personel bankruptcies and why it's up to network security folks to help stop the problem.

Texans used botnets, spam in stock scheme, SEC says, 07/10/07: The U.S. Securities and Exchange Commission has filed securities-fraud charges against two Texas men who allegedly hijacked computers nationwide to send millions of spam e-mails and cheat investors out of more than $4.6 million.

A practitioner’s advice on biometrics for authentication, 07/09/07: For the past two weeks, I’ve written about the growing use of biometrics as a means of identification as well as authentication for a range of services. Greg Faust, CEO of Florida-based Valid Technologies, wrote to me to offer some practical information about using biometric authentication for enterprise IT.

TODAY'S MOST-READ STORIES:

1. How big is the botnet problem?
2. Google Earth captures China's new ballistic-missile sub
3. Juniper scales down service router
4. Novell: Don't worry about Microsoft’s GPLv3 stand
5. Six burning VoIP questions
6. Google to buy Postini for $625M
7. The $2.3M home lab of Quadruple CCIE
8. The 7 Wonders of the Internet
9. DoD offers $1M for wearable power supply
10. 6 ways to fight back against botnets

MOST READ REVIEW:
Blade servers vs. rack servers


Contact the author:

Senior Editor Ellen Messmer covers security for Network World. E-mail Ellen.



BONUS FEATURE

IT PRODUCT RESEARCH AT YOUR FINGERTIPS

Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details.


PRINT SUBSCRIPTIONS AVAILABLE
You've got the technology snapshot of your choice delivered to your inbox each day. Extend your knowledge with a print subscription to the Network World newsweekly, Apply here today.

International subscribers, click here.


SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription.


Advertising information: Write to Associate Publisher Online Susan Cardoza

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772

Copyright Network World, Inc., 2007

No comments:

Post a Comment