Search This Blog

Thursday, October 25, 2007

Storm worm strikes back at security pros; Taxis are biggest security risk to companies

Network World

Security News Alert




Network World's Security News Alert, 10/25/07

Storm worm strikes back at security pros, 10/24/07: The Storm worm is fighting back against security researchers that seek to destroy it and has them running scared, Interop New York show attendees heard Tuesday.

TJX data breach affected 94 million cards, banks allege, 10/24/07: The TJX data breach affected more than 94 million credit and debit card accounts, more than twice the number acknowledged by the big retailer, a group of banks allege in a new court filing.

Taxis flagged as big security risk for mobile phones, laptops and digital assistants, 10/24/07: The biggest security threat to companies with a mobile workforce isn’t wardriving hackers stealing 1s and 0s from the air or burrowing through the corporate firewall; it’s absent-minded employees. During a six-month period in 2006, the publication reported, London taxicab drivers turned in the following electronic items to their lost-and-found departments:
63,315 mobile phones; 5,838 PDAs; 4,972 notebook computers

Webcast: Get the latest on NAC

Learn the latest on Network Access Control in Network World's Perspectives Editorial Webcast. Discover how IT professionals can leverage this hot security technology in their networks, while also learning about key management areas that have not yet been perfected.

To learn more click here.

Payment-card security standards for wireless and Web applications debated, 10/24/07: Proposed new security standards governing wireless and applications from the Payment Card Industry Security Standards Council are stirring debate among merchants still struggling with PCI compliance on existing security standards.

CA advances mainframe security tools, 10/24/07: CA this week added automation and business intelligence features to five mainframe security software products designed to control access, manage entitlements, and audit and report on compliance across IBM z/OS systems.

Malware on the rise as criminals target vulnerable firms, 10/23/07: Malicious code that installs files such as Trojans, password stealers, keyboard loggers and other malware on users' systems registered a fivefold increase in the first half of 2007, according to research released by Microsoft at the RSA Security conference in London.

Court leaks info of alleged ID thief, 10/23/07: Things just aren't going well for Timothy Scott Short. Just days after a pair of tech support calls he made to printer manufacturer Digimarc resulted in his arrest, he now finds himself on the receiving end of a data breach.

Was it the VLAN at fault: Hackers gain access to private hotel network using Cisco VoIP - readers and the hackers argue why hotel's VLAN allowed this to happen.

Free excerpt from Cisco NAC book: Read a free chapter from the book "Cisco Network Admission Control, Volume I: NAC Framework Architecture and Design."

20 great Firefox extensions: You've seen the lists of Top X great Firefox extensions on other sites, but they all have a different 10 favorites. So how do you decide which are worthy of your attention? We bring you THE definitive list of the 20 best culled from all the top 10 lists we could find.

Top 15 networkiest moments in sports: It's game time for tech time. Here's are ranking of the top events where sports and networking intersect.

MOST-READ STORIES:
1. Storm worm strikes back at security pros
2. Top 20 Firefox extensions
3. Unlimited gall to cost Verizon $1 million
4. 'Fire blogging' tech expert on the frontlines
5. Cisco's $330M buy into WiMAX
6. Ballmer disses Google on wireless plans
7. Why swearing at work is a good thing
8. ID thieves have 50% chance of going to prison
9. Wireless video transfers 100X faster than WiFi
10. Gartner's top 10 strategic technologies for 2008

MOST-DOWNLOADED PODCAST:
Twisted Pair: Rumor Mill — Who's Buying Who?


Contact the author:

Senior Editor Ellen Messmer covers security for Network World. E-mail Ellen.



BONUS FEATURE

IT PRODUCT RESEARCH AT YOUR FINGERTIPS

Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details.


PRINT SUBSCRIPTIONS AVAILABLE
You've got the technology snapshot of your choice delivered to your inbox each day. Extend your knowledge with a print subscription to the Network World newsweekly, Apply here today.

International subscribers, click here.


SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription.


Advertising information: Write to Associate Publisher Online Susan Cardoza

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772

Copyright Network World, Inc., 2007

No comments: