Search This Blog

Wednesday, January 14, 2009

Beast hiding in Microsoft Patch Tuesday vulnerability; Browser bug allows phishing without e-mail

Researchers have hope of cheap, distributed zero-day worm defense
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Trend Micro
rule

Keeping Bad Content Off your Net.
You can ensure your gateway process 50% to 70% less traffic with a hybrid approach to security. Discover how in this IDC whitepaper. Keep malware in the cloud with protection services that filter out spam, malicious websites and questionable material before it ever hits your gateway. Download this whitepaper now.

rule

Spotlight Story

Experts say beast hiding in Microsoft Patch Tuesday vulnerability
Microsoft's Patch Tuesday dropped in on 2009 with a whisper revealing only a single patch covering three vulnerabilities with the Windows operating system's Server Message Block Protocol.
Plus: Patch Tuesday is small but critical

Related News:

Browser bug could allow phishing without e-mail A bug found in all major browsers could make it easier for criminals to steal online banking credentials using a new type of attack called "in-session phishing," according to researchers at security vendor Trusteer.

Researchers have hope of cheap, distributed zero-day worm defense Shutting down zero-day computer attacks could be carried out inexpensively by peer-to-peer software that shares information about anomalous behavior, say researchers at the University of California at Davis.

Taxpayer data at IRS remains vulnerable, GAO warns Less than three months after the Treasury Inspector General for Tax Administration reported that there were major security vulnerabilities in two crucial Internal Revenue Service systems, the IRS's security practices ...

Paris Hilton's Web site being used in Web attack Paris Hilton's Web site has been hacked and is serving visitors a malicious Trojan program designed to steal sensitive information from their computers.

Frankly Speaking: Twitter hack was so 1983 Please tell me this isn't happening in 2009: Last week, an 18-year-old student reportedly used a password-guessing program to get into the account of a Twitter employee (see story). From there, the teen cracker hijacked the accounts of President-elect Barack Obama, Britney Spears, Fox News and 30 other Twitter users.

Paybacks: Telescammers to fork over $50 million in restitution The Federal Trade Commission today said a group of telescammers will pay out nearly $50 million to settle charges they deceived over one million people in a bank information fraud scheme. As is unfortunately the situation in many of these case, the $50 million restitution is substantial, but it pales in comparison to the almost $172 million the FTC says Suntasia Marketing bilked out of its victims.

SonicWall airs zippy security appliance for small businesses SonicWall is introducing a multi-function security appliance for small businesses that gives five times more throughput than its low-end devices for an extra $200.

AVG acquires behavioral detection security company Czech security company AVG has completed a deal to acquire Sana Security, which specializes in detecting malicious software based on its behavior.

What Free Security Programs Can Protect My PC? You really can protect your PC with free software, but there's a price. Multiple free security programs usually aren't as easy to use as one pricey suite. Your less likely to get decent support (perhaps I should say even less likely). And they lack features like antispam and child protection which you may or may not need. All of the companies that give away security programs sell more feature-rich versions, which come with better support and additional features.

Asked & Answered: PKI A reader asks, "Can you explain me the public key infrastructure in detail or reference any book with detailed explanation over PKI?" See expert Ron Nutter's answer in today's IT Asked & Answered.

Stop data leaks Yes, you can keep sensitive data from leaving your organization. Our revamped Product Guide tells you what you need to know, including 5 questions to ask data-leak protection vendors before buying.

January giveaways from Cisco Subnet and Microsoft Subnet
Up for grabs: Two Cisco training courses from Skyline-ATS worth up to $6,990, a Microsoft training course from New Horizons worth up to $2,500, 15 copies each of the hot book titles Microsoft SQL Server 2008 Management and Administration, IPv6 Security and Chained Exploits: Advanced Hacking Attacks. Get all the entry details here.


IT Outlook '09
Products of the WeekIn-depth analysis of the latest enterprise strategies, start-ups to watch, people to know, and more.

9 hot technologies for '09
9 hot technologies for '09Our annual rundown, plus a tip or two about how to approach each hot technology.

Sponsored by Trend Micro
rule

Keeping Bad Content Off your Net.
You can ensure your gateway process 50% to 70% less traffic with a hybrid approach to security. Discover how in this IDC whitepaper. Keep malware in the cloud with protection services that filter out spam, malicious websites and questionable material before it ever hits your gateway. Download this whitepaper now.

rule

Effectively Managing Change.
Find the right network/system management platforms that leverage the latest IT technologies in this Executive Guide, "The New Network/System Management Challenges." Get a handle on server sprawl, managing 802.11n wireless LANs, and data center automation tool integration. Confidently deploy innovative technologies that drive efficiencies today.
Download this Executive Guide now.


Executive Guide: Green IT
Download this Network World Executive Guide, "Going Green: Trends, tips and case studies," for timely, real-world advice. By adopting an effective green approach to IT you'll save your company money and even bolster company profits.
Find out how to make it happen today.

 

01/14/09

Today's most-read stories:

  1. Why Windows 7 will crush Linux
  2. Outlook '09
  3. Top 25 software screw-ups
  4. Sources: 'Major' layoffs at Oracle, more on the way
  5. Windows 7 beta: Complete resource center to the OS
  6. Palm Pre vs. Apple iPhone: How they stack up
  7. Apple in the enterprise: Inevitable, still not easy
  8. EMC takes the gloves off with VMware
  9. Cisco's ASR 1000 router built for 10-year tenure
  10. Windows 7 beta shows off task bar, UI goodies


The Evolution of Network Security
Zero in on the hottest security technologies you need to know about in this Executive Guide. Better protect your IT environment with NAC, data leakage prevention controls and auditing tools.
Learn more.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: