Search This Blog

Friday, September 21, 2007

Ameritrade customers vent about data breach; Options for stopping open source iPhone use

Network World

Security News Alert




Network World's Security News Alert, 09/21/07

Ameritrade customers vent about data breach, 09/20/07: The 2.3 million Ameritrade customers whose personal data was compromised sometime over the past 20 months can get a free year of credit checks, but only if they ask for it.

Apple’s options for stopping open source iPhone use, 09/20/07: Although Apple’s Steve Jobs has declared war on iPhone hackers, no one knows for certain how he plans to stop them.

Yahoo Messenger hit with ninth zero-day exploit, 09/19/2007: Attack code that targets Yahoo Messenger has been published on the Internet, a security researcher warned Wednesday, marking the ninth exploit aimed at the popular instant messaging software so far this year.

Comprehensive Network Access Control

The new wave of sophisticated crimeware not only targets specific companies, but it also targets desktops and laptops as backdoor entryways into business operations and resources. Network access control enables proper configuration and security of user endpoints before they are allowed access on the corporate network.
Click here to download this whitepaper.

Is the U.S. at risk from cyberwarfare?, 09/20/07: May was not a good month for geeks in Estonia. The tiny Baltic republic weathered a month-long cyberattack that shuttered Internet servers nationwide. At the height of the crisis, people who wanted to use payment cards to buy bread or gas had to wait, as the onslaught crippled Estonia's banks.

VMware bugs shine spotlight on virtualization security, 09/20/07: A set of newly discovered flaws in components of VMware's virtual machine software has called attention to some of the security risks associated with the practice of running virtual computers on a single system.

Trend Micro security gurus look for better ways to classify malware, 09/19/07: Two senior security veterans from Trend Micro are trying to get the industry to change how it classifies malicious software. They argue that today's classification system, which tends to focus on the technical way the software works, neglects a far more important metric that matters more to users: how it tries to steal your money.

IM is the biggest, most overlooked threat, 09/19/07: Messaging guru Michael Osterman discusses the overlooked IM threat, the best low-cost archiving solutions and how social networking affects the enterprise in this chat transcript.

Paypal claims gains against phishers, 09/20/2007: Paypal security chief Michael Barrett isn't ready to claim a victory in the fight against phishing schemes, but he said that his company is slowly turning the tide using a set of new partnerships and technological means.

Video: Speaking with Whitfield Diffie: Network World Senior Editor Tim Greene talks with Whitfield Diffie, Sun Fellow, Chief Security Officer and noted cryptographer, about open source in the enterprise, security and more.

Security researcher finds flaw in Windows Media Player, 09/19/2007: Hackers can wield malicious Windows Media Player files to exploit any unpatched Internet Explorer (IE) vulnerability on a PC -- even if the user relies on Firefox, Opera or some other Web browser, a U.K. security researcher said yesterday.

Chat with Amazon.com’s CTO live
If ever there were a man that knew how to eek out capacity and secure a data center, it would be Werner Vogels, vice president & CTO of Amazon.com. Join him for a live chat on Monday Oct. 1 from 2 p.m. - 3 p.m. EDT.

TODAY'S MOST-READ STORIES:

1. How much does the store owe this PC buyer?
2. Gartner: Open source impossible to avoid
3. Ameritrade leak started earlier than reported
4. Obsolete WEP Wi-Fi gets new security shield
5. Cisco's risky business of acquisitions
6. BJ’s shifts to MPLS network
7. Cisco fleshes out Microsoft cooperation
8. IBM targets Office with free productivity apps
9. The Hell of Gateway's tech support
10. One less reason to adopt IPv6?

MOST-DOWNLOADED PODCAST:
NW Panorama: 5 Cool iPod Tips and Tricks


Contact the author:

Senior Editor Ellen Messmer covers security for Network World. E-mail Ellen.



BONUS FEATURE

IT PRODUCT RESEARCH AT YOUR FINGERTIPS

Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details.


PRINT SUBSCRIPTIONS AVAILABLE
You've got the technology snapshot of your choice delivered to your inbox each day. Extend your knowledge with a print subscription to the Network World newsweekly, Apply here today.

International subscribers, click here.


SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription.


Advertising information: Write to Associate Publisher Online Susan Cardoza

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772

Copyright Network World, Inc., 2007

No comments: