Search This Blog

Monday, November 26, 2007

Apple 'fixes' causing problems

Security: Threat Alert Network World logo
NetworkWorld.com | Security Research Center | Update Your Profile
Apple 'fixes' causing problems

Jason Meserve By Jason Meserve
Apple might be suffering from a little post-Thanksgiving indigestion as a new bug in QuickTime is cauing problems for Windows XP and Vista users. And an older bug has reappeared in Leopard's Mail application, which could be used to run malware on an unsuspecting user's machine. Apple's not alone: rPath, Debian, Mandriva and Gentoo all have multiple patches out. Read full story

Jason Meserve is Network World's Multimedia Editor and writes about streaming media, search engines and IP Multicast. Check out his Multimedia Exchange Weblog.

Check out Jason Meserve and Keith Shaw's weekly podcast "Twisted Pair"


SPONSORED BY AWARENESS TECHNOLOGIES INC.
rule

Rethinking Desktop Agents
Download this whitepaper to learn why your organization is not really protecting itself thoroughly from insider threats if it is not using desktop agents. Learn how desktop agents can give IT managers a complete picture of activities on individual user laptops and PCs. Download this whitepaper now!

rule
RELATED NEWS:

From the interesting reading department:

Are your servers vulnerable to DNS attacks?
More than half of Internet name servers today allow requests that leave networks vulnerable to cache poisoning and distributed denial of service attacks -- a fact that has not improved over the past year. NetworkWorld.com, 11/19/07.

Spammers pose as private eyes to spread malware
It looks like Veronica Mars and Magnum, PI are getting into the malware business. Commtouch, an Israeli security firm that specializes in protecting e-mail integrity, says that it has detected a new malware outbreak that is spread through e-mails claiming to be from private investigators. Network World, 11/19/07.

12 spam research projects that might make a difference
Those who commit cybercrime know they need to stay on the cutting edge of technology to come up with new and different ways to swindle people. Luckily, the good guys are also spending time in research labs developing ways to thwart the latest tricks employed by spammers, phishers and other criminals. Network World, 11/20/07.

Microsoft Fixes Gaffe in Time for Patch Tuesday
For the second time in less than three weeks, Microsoft Corp. had to apologize for problems with a tool that many IT managers rely on to deploy the software vendor’s security patches and other software updates. Computerworld, 11/19/07.

One tiny math mistake and the terrorists win?
Hall of Fame cryptographer Adi Shamir, a professor at the Weizmann Institute of Science in Israel and the "S" in RSA, sounded the alarm about a potential problem with popular computing chips: namely that a math error unknown to the chip maker but discovered by a bad guy could lead to catastrophic consequences. Buzzblog, 11/17/07.
Also: Microsoft confirms that XP contains random number generator bug

Wetware Hacks
Your hardware is well secured. You've got a good perimeter firewall in place that only allows communication on authorized ports, an IDS to scan for suspicious activity, WPA2 encryption set on wireless devices, and so on. Your software is secure as well. Patches up to date, good password policy enforcement, etc. So where is the weak point in your network? I think there's a common expression used to describe it -- the problem exists between keyboard and chair. Symantec Security Response blog, 11/22/07.

A Look Back at the Security Trends of 2007
Here, in no particular order, are the top 10 Internet security trends of 2007. Symantec Security Response blog, 11/23/07.


BIG THREATS IN '08
Top 5 security threats in 2008Top 5 security-menace predictions for next year.

ALL-IN-ONE FIREWALL TEST
idemandJuniper, Check Point, Cisco lead way in test of 13 UTM devices.

SPONSORED BY AWARENESS TECHNOLOGIES INC.
rule

Rethinking Desktop Agents
Download this whitepaper to learn why your organization is not really protecting itself thoroughly from insider threats if it is not using desktop agents. Learn how desktop agents can give IT managers a complete picture of activities on individual user laptops and PCs. Download this whitepaper now!

rule

Join Network World's Technology Opinion Panel
Here is your chance to help shape the future of IT. You know what products and enhancements are needed, you have the insight and foresight to be out front and provide direction to Network Word and the network industry. To join the panel, complete a brief registration survey
. The panel is strictly for technology professionals to share their vision.

Featured reader resource

90% of IT Managers are leaving their company at risk for a DNS ATTACK. Get the tools and resources you need to keep your DNS healthy and secure. Run a DNSreport on your domain today - 56 critical tests run in 8 seconds.

Visit www.dnsreport.com to learn more. (apply coupon NWW2007NLA for a 25% membership discount)

 

11/26/07

TODAY'S MOST-READ STORIES:

  1. 2007 Cool Yule Tools Gift Guide
  2. Fired Microsoft CIO lands new gig
  3. Testing all-in-one firewalls
  4. Indiana U. grabs Bandwidth Challenge crown
  5. AT&T calls teleworkers back to cubicle life
  6. NASA's new bargain basement satellite
  7. Hackers jack Monster.com
  8. Google building 10 Gigabit Ethernet switches
  9. Standards suggested for writing secure Java
  10. 12 cutting-edge spam research projects

MOST POPULAR SLIDESHOW:
Top IT Turkeys of 2007


Executive Guide The Security Treadmill

This Executive Guide offers interviews with leading, real-world security experts who tell you how to get inside users' heads, fight for a bigger security budget, and whether VoIP security issues are overstated or underrated, and much more. Review this informative guide today.

Click Here for More Information



IT Buyers guide

IT Buyer's Guides
Compare products, get advice, and check out tests and reviews from the experts at Network World. Over 70 categories. Visit now.

 


To continue receiving NetworkWorld's Security: Threat Alert newsletter, please add @nwfnews.com to your white list.

COMPLIMENTARY SUBSCRIPTIONS AVAILABLE
As a NW newsletter subscriber you are eligible to receive 50 issues of Network World Magazine, in print or electronic format, free of charge.

Sign up for your subscription today: Apply here. International subscribers,click here.

 

SUBSCRIPTION SERVICES
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Terms of Service/Privacy

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772
Copyright Network World, Inc., 2007

 

 



No comments: