Search This Blog

Monday, December 03, 2007

Nortel bolsters security gear; Search engines are the new villains in malware attacks

Security Alert Network World logo
NetworkWorld.com | Security Research Center | Update Your Profile
Nortel bolsters security, business process gear

Jim Duffy By Jim Duffy
Nortel this week unveiled new and enhanced products designed to improve security and further optimize the network for business processes. Read full story

Jim Duffy is managing editor of Network World's service provider equipment coverage. He has 18 years of high-tech reporting experience, including over 12 years at Network World. Previously, he was senior editor at Computer Systems News and associate editor/reporter at Electronic News and MIS Week. He can be reached at jduffy@nww.com.


SPONSORED BY RED CONDOR
rule

FIGHT ON BRAVE Spam FIGHTER
RedCondor honors the IT Professional at LiveSpamFree.org. View Spam Fighter TV spots as seen on SciFi Channel. Play the "Spam Attack" game free, get ranked, win prizes. Or just rant about Spam. If Spam is your enemy, RedCondor is your ally.

rule
RELATED NEWS:

Search engines have become the villains in malware attacks, 11/29/07: Google, Yahoo, and Microsoft MSN have unwittingly become the delivery engine for malware attacks. According to blog posts by Search Engine Journal and SunBelt Software, attackers are elevating the search result positioning of malware laced sites, says Microsoft Subnet blogger Mitchell Ashley.

Comcast continues to block peer-to-peer, EFF reports, 11/30/07: Comcast continues to slow down customers' connections to some peer-to-peer applications, using hacker-like techniques against its own subscribers, according to a report released by the Electronic Frontier Foundation.

Securing Cisco Devices, 11/19/2007: So far, we’ve discussed securing your devices by implementing passwords on your console, your aux, and your VTY. We’ve discussed using SSH rather than telnet for security purposes, and we’ve talked about using “enable secret passwords” on your accounts. In my last article, we discussed disabling protocols like CDP for security purposes since it gives away too much information about your network. There are still many other things covered in Global Knowledge courses that you can do to secure your network.


HOLIDAY GIFT GUIDE
2007 Cool Yule Tools - Holiday Gift Guide Find the very best tech holiday gift ideas.

'07 ENTERPRISE ALL-STARS
'07 ENTERPRISE ALL-STARS Honoring outstanding technology projects.

SPONSORED BY RED CONDOR
rule

FIGHT ON BRAVE Spam FIGHTER
RedCondor honors the IT Professional at LiveSpamFree.org. View Spam Fighter TV spots as seen on SciFi Channel. Play the "Spam Attack" game free, get ranked, win prizes. Or just rant about Spam. If Spam is your enemy, RedCondor is your ally.

rule

Get Expert Directory and Identity Training at DEC 2008
Join NetPro, Microsoft and the world's top directory and identity experts for the Seventh Annual Directory Experts Conference (DEC) 2008, the only conference for expert training on Microsoft directory and identity technologies. DEC 2008 runs March 2-5, 2008, at the Hilton Chicago. Register today at: http://www.dec2008.com

Featured reader resource

90% of IT Managers are leaving their company at risk for a DNS ATTACK. Get the tools and resources you need to keep your DNS healthy and secure. Run a DNSreport on your domain today - 56 critical tests run in 8 seconds.

Visit www.dnsreport.com to learn more. (apply coupon NWW2007NLA for a 25% membership discount)

 

12/03/07

TODAY'S MOST-READ STORIES:

  1. Open source's future
  2. FBI 'Bot Roast II
  3. Cisco confirms ability to eavesdrop
  4. 3.3 billion mobile accounts
  5. 2007 Cool Yule Tools Gift Guide
  6. Sun bullies open source project owner
  7. Teleworkers called back to cubicle life
  8. Boeing, USAF show off bomb firing tech
  9. Fast Windows fixes
  10. Which certifications are worth your time?

MOST POPULAR SLIDESHOW:
Networkiest TV characters


Executive Guide The Security Treadmill

This Executive Guide offers interviews with leading, real-world security experts who tell you how to get inside users' heads, fight for a bigger security budget, and whether VoIP security issues are overstated or underrated, and much more. Review this informative guide today.

Click Here for More Information



IT Buyers guide

IT Buyer's Guides
Compare products, get advice, and check out tests and reviews from the experts at Network World. Over 70 categories. Visit now.

 


To continue receiving NetworkWorld's Security Alert newsletter, please add @nwfnews.com to your white list.

COMPLIMENTARY SUBSCRIPTIONS AVAILABLE
As a NW newsletter subscriber you are eligible to receive 50 issues of Network World Magazine, in print or electronic format, free of charge.

Sign up for your subscription today: Apply here. International subscribers,click here.

 

SUBSCRIPTION SERVICES
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Terms of Service/Privacy

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772
Copyright Network World, Inc., 2007

 

 



No comments: