Search This Blog

Wednesday, August 29, 2007

Deja vu: Sony uses rootkits; Hackers wanted, apply within

Network World

Security News Alert




Network World's Security News Alert, 08/29/07

Deja vu: Sony uses rootkits, charges F-Secure, 08/27/07: A line of USB drives sold by Sony Electronics installs files in a hidden folder that can be accessed and used by hackers, a Finnish security company charged Monday, raising the specter of a replay of the fiasco that hit Sony's music arm two years ago when researchers discovered that its copy protection software used rootkit-like technologies.

Hackers wanted, apply within: Microsoft employs a whole lot of hackers and now they have their own, new blog, hackers@microsoft.com.

Higher education IT spending shifts in wake of campus slayings, 08/28/07: Shootings at colleges and universities have shifted IT spending priorities, with institutions investing heavily in upgrading their emergency communications systems, according to a new report from a higher education IT group.

Network World Security Buyer's Guide

Find the right security products for your enterprise - fast. From anti-spam to wireless LAN security, our Buyer's Guides have detailed information on hundreds of products in more than 20 categories. With the side-by-side comparison tool you can evaluate product features to make the best decision for your enterprise.

Click here to go to the Security Buyer's Guide now.

Microsoft black eye over antipiracy servers snafu: For 19-hours, the Microsoft servers that identify which copies of Windows XP and Vista are counterfeit went down. Granted, Microsoft loses billions of dollars to counterfeiting, but legitimate software owners shouldn’t be thrown into positions where they suddenly cannot do their jobs, says the Microsoft Subnet blog.

Symantec CEO: Microsoft causing security price pressure, 08/28/07: Symantec Chairman and CEO John Thompson blamed Microsoft Tuesday for the current pricing competition his company faces in the consumer security market, suggesting Microsoft's pricing scheme for its first entry into the space is "monopolistic."

Facebook cracks down on developer spam, 08/28/07: Three months after it opened its platform to outside developers, Facebook Inc. is taking steps to prevent some third-party applications from engaging in what the social networking company considers inappropriate actions.

Symantec bolsters AntiVirus and Internet Security packages, 08/28/07: Symantec today unveiled the 2008 editions of its Norton AntiVirus and Internet Security desktop protection products, adding what it calls “threat interceptor” defense to prevent execution of malicious code enabled through a drive-by download.

Protecting Your network edge: Now for the bad news: Cisco Subnet blogger and IP routing expert Jeff Doyle says there are a number of tools to help secure your network edge but many involve a peformance tradeoff.

iPhone unlocking video hits Web, 08/28/07: A video showing the founder of a Belfast, Northern Ireland, company unlocking the iPhone hit the Web early Wednesday U.K. time as proof that software exists that can unlock Apple's device for use with carriers other than AT&T.

iPhone unlocker trades phone for 'sweet' car, 08/28/07: A hacker who figured out how to unlock the iPhone has traded an unlocked phone for a new car.

The Monster.com mess, 08/24/07: The last thing you need when you're unemployed is a bank account that's suddenly emptied. But that's exactly what some unwary users of employment search site Monster.com faced after identity thieves made off with the personal information of more than a million people looking for jobs.

TODAY'S MOST-READ STORIES:

1. Airline puts Linux PC in every seat
2. How worried should you be about metal whiskers?
3. Deja vu: Sony uses rootkits, F-Secure says
4. Metal whiskers: a visual tour
5. How close is World War 3.0?
6. Acer to acquire Gateway for $710M
7. U.S. troops swap combat ideas on new site
8. Storm worm spam spoofs YouTube
9. Open-source companies to watch
10. Hot IT jobs: Systems administrator

MOST DOWNLOADED PODCAST:
Laptops designed for Linux: Matt Domsch


Contact the author:

Senior Editor Ellen Messmer covers security for Network World. E-mail Ellen.



BONUS FEATURE

IT PRODUCT RESEARCH AT YOUR FINGERTIPS

Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details.


PRINT SUBSCRIPTIONS AVAILABLE
You've got the technology snapshot of your choice delivered to your inbox each day. Extend your knowledge with a print subscription to the Network World newsweekly, Apply here today.

International subscribers, click here.


SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription.


Advertising information: Write to Associate Publisher Online Susan Cardoza

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772

Copyright Network World, Inc., 2007

No comments: