Search This Blog

Tuesday, September 18, 2007

Cybercrime accelerates, software vulnerabilities dip; Kerberos gets second wind

Network World

Security News Alert




Network World's Security News Alert, 09/18/07

Cybercrime accelerates while software vulnerabilities dip, researchers find, 09/17/07: The number of software vulnerabilities recorded in the first half of this year declined, while the use of cybercrime toolkits accelerated, according to separate risk-assessment reports released today from IBM and Symantec.

Kerberos gets second wind, 09/17/07: The Massachusetts Institute of Technology next week is throwing a 20th birthday party for the Kerberos authentication system and the big present is a new consortium devoted to keeping the security system going well into the future.

McAfee looks to ease security mgmt., 09/17/07: McAfee Monday began shipping the fourth version of its ePolicy Orchestrator (ePO) management console and also introduced a software development program that lets developers integrate third-party security products under ePO.

Comprehensive Network Access Control

The new wave of sophisticated crimeware not only targets specific companies, but it also targets desktops and laptops as backdoor entryways into business operations and resources. Network access control enables proper configuration and security of user endpoints before they are allowed access on the corporate network.
Click here to download this whitepaper.

Defenses against DDoS strengthening: survey says, 09/17/07: While most networks are adept at repelling small distributed denial-of-service attacks, few are prepared for large-scale botnet attacks attacks that employ tens of thousands of zombie hosts, says a new report by Arbor Networks.

Insiders overtake viruses as biggest security worry, 09/14/07: Company insiders have overtaken viruses as the most reported security incident, the annual report from the respected U.S. Computer Security Institute (CSI) has reported.

Push for e-mail encryption: Cisco security expert Jamey Heary describes how IronPort PostX encrypts e-mails using push technology.

Next-generation firewalls will need wide variety of features, 09/14/07: Next-generation firewalls can inspect at the application layer and peer into SSL traffic.

Hacked GOP site infects visitors with malware, 09/14/07: A Republican Party Web site has been hacked, and for some time it has been spreading a variation of the long-running Storm Trojan horse to vulnerable visitors, a security researcher said Friday.

Chicago terrorist threat assessment leaked over P2P, 09/14/07: Officials at consulting firm Booz Allen Hamilton are looking into how a Fox News reporter acquired a confidential terrorist threat assessment on Chicago over a public file-sharing network.

Names, contact info on TD Ameritrade customers compromised, 09/14/07: Brokerage firm TD Ameritrade Holding Friday disclosed that the names, addresses, phone numbers and "miscellaneous trading" information of potentially all of its more than 6 million retail and institutional customers have been compromised by an intrusion into one of its databases.

TODAY'S MOST-READ STORIES:

1. One less reason to adopt IPv6?
2. Researchers flash personal aircraft, future jetpack
3. Does 802.11n spell the end of Ethernet?
4. What 'The Sopranos' taught me about tech
5. 10 IT management software companies to watch
6. SCO's Chapter 11 filing postpones Novell trial
7. Will users ever smarten up about phishing?
8. Meet the other Ciscos
9. TJX data criminal gets 5 years
10. Internet domain name outlaw faces 20 years

MOST-READ REVIEW:
VM management tools from Microsoft, VMware, XenSource leave room for improvement


Contact the author:

Senior Editor Ellen Messmer covers security for Network World. E-mail Ellen.



BONUS FEATURE

IT PRODUCT RESEARCH AT YOUR FINGERTIPS

Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details.


PRINT SUBSCRIPTIONS AVAILABLE
You've got the technology snapshot of your choice delivered to your inbox each day. Extend your knowledge with a print subscription to the Network World newsweekly, Apply here today.

International subscribers, click here.


SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription.


Advertising information: Write to Associate Publisher Online Susan Cardoza

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772

Copyright Network World, Inc., 2007

No comments: