Search This Blog

Thursday, December 20, 2007

Google, Cisco and Apple round out 2007 patches

Security: Threat Alert

Network World logo
NetworkWorld.com | Security Research Center | Update Your Profile
Google, Cisco and Apple round out 2007 patches

Jason Meserve By Jason Meserve
In our last newsletter of 2008, we bring you two potential flaws being investigated by Google in the Google Toolbar and GMail. Also, Cisco patches a firewall bug; Apple keeps the patch parade coming with fixes for OS X and Safari; Microsoft's latest patches may have crippled IE; and Juniper is bitten by a BGP bug. Happy New Year! Read full story

Jason Meserve is Network World's Multimedia Editor and writes about streaming media, search engines and IP Multicast. Check out his Multimedia Exchange Weblog.

Check out Jason Meserve and Keith Shaw's weekly podcast "Twisted Pair"

MORE STORIESARROW


SPONSORED BY TRIPWIRE
rule

Winning the IT Game: Improving Efficiency and Controlling Risk with Configuration Audit and Control
Find out how configuration audit and control can quickly bring value to any IT organization by controlling risks and lowering costs in four major IT project areas: compliance and security, system availability, CMDB, and change and configuration automation.

rule
RELATED NEWS:

VoIP vulnerabilities increasing, but not exploits
PBXs are servers on corporate networks and are susceptible to the many exploits that networks in general are heir to, such as denial-of-service and buffer overflows. There have been few exploits so far, however, and none that were widespread or crippling to businesses. NetworkWorld.com 12/17/07.

Successful phishing attacks up, online survey shows
Phishing attacks on U.S. consumers were more successful this year than last, says Gartner. The good news? Phishing victims appear to be getting more help from banks and PayPal to recover their losses. NetworkWorld.com 12/17/07.

Privacy, data breaches still run rampant, shows survey of IT pros
If it seems as though digital privacy invasions and personal-data breaches happen every day in corporate America, these survey results will only reinforce that notion. Network World, 12/17/07.

Getting Acquainted With Rock Phishing
Antiphishing filters basically work either on block listing or on heuristics. "Rock phish" attacks are quite a recent phenomenon that has posed a major challenge to both of the above mentioned antiphishing filters, simply because the unique structure of a Rock phish attack circumvents antiphishing filters. Symantec Security Response blog, 12/18/07.


THE FASTEST FIREWALLS
Clear Choice Test  Crossbeam, IBM win raw performance test; Juniper scores on price.

HOLIDAY GIFT GUIDE
2007 Cool Yule Tools - Holiday Gift Guide Find the very best tech holiday gift ideas.

SPONSORED BY TRIPWIRE
rule

Winning the IT Game: Improving Efficiency and Controlling Risk with Configuration Audit and Control
Find out how configuration audit and control can quickly bring value to any IT organization by controlling risks and lowering costs in four major IT project areas: compliance and security, system availability, CMDB, and change and configuration automation.

rule

Holiday Tech Toys
Stumped on what gadgets and gizmos to give this holiday? Have no fear, Cool Tools' Keith Shaw is here. We do all of the heavy lifting of wading through hundreds of submitted technology products to find the very best holiday gift ideas. Click here to view our holiday gift guide: http://www.nww.com/PSA2_1210

Featured reader resource

90% of IT Managers are leaving their company at risk for a DNS ATTACK. Get the tools and resources you need to keep your DNS healthy and secure. Run a DNSreport on your domain today - 56 critical tests run in 8 seconds.

Visit www.dnssfuff.com to learn more. (apply coupon NWW2007NLA for a 25% membership discount)

 

12/20/07

TODAY'S MOST-READ STORIES:

  1. How to really bury a mainframe
  2. BGP bug bites Juniper software
  3. 10 crazy USB stocking stuffers
  4. Xbox signal jamming WLANs
  5. 15 must-have Firefox tricks
  6. Feds are dropping the ball on IPv6
  7. Microsoft security update cripples IE
  8. Phone-record thieves laugh at the law
  9. Guru predicts last-minute IPv6 switch
  10. New Sprint chief Hesse faces a big inbox


TOP 100 OF 2007


Webcast: Beyond perimeter security

Listen to industry experts discuss the need for strong security throughout an IT environment. One expert says, the barbarians are not at the gate, they are already inside. Securing one access point to your network simply is not enough. Learn more today.

Access this webcast now.



IT Buyers guide

IT Buyer's Guides
Compare products, get advice, and check out tests and reviews from the experts at Network World. Over 70 categories. Visit now.

 


To continue receiving NetworkWorld's Security: Threat Alert newsletter, please add @nwfnews.com to your white list.

COMPLIMENTARY SUBSCRIPTIONS AVAILABLE
As a NW newsletter subscriber you are eligible to receive 50 issues of Network World Magazine, in print or electronic format, free of charge.

Sign up for your subscription today: Apply here. International subscribers,click here.

 

SUBSCRIPTION SERVICES
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Terms of Service/Privacy

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772
Copyright Network World, Inc., 2007

 

 



No comments: