Wednesday, January 21, 2009

Detecting Internet routing 'lies'; How to protect your PC against the Downadup worm

3 reasons why Obama's BlackBerry is a national security threat
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by NetApp
rule

Deploying Microsoft Exchange Server 2007 with NetApp Networked Storage
Architecting and planning a Microsoft Exchange 2007 deployment is not a simple undertaking. Important decisions regarding servers, networking and storage must be made. Explore the considerations and challenges of an Exchange environment, as well as the holistic impact it will have on your entire IT infrastructure and business processes.

rule

Spotlight Story
Detecting Internet routing "lies"

Carolyn Duffy Marsan By Carolyn Duffy Marsan
Australian Geoff Huston is one of the foremost authorities on Internet routing and scaling issues. We sent Huston a few questions about the U.S. government's plan to bolster R&D to secure the Internet's core routing protocol, the Border Gateway Protocol (BGP). Here are excerpts of from what Huston had to say. Read full story

Related News:

FAQ: How to protect your PC against the Downadup worm Security experts say it's the biggest worm attack in years, call it "amazing" and report that it infected nearly 9 million PCs in just two weeks.

Obama cybersecurity plan a golden opportunity for tech industry, Forrester says Tech companies will have a major opportunity to snag government contracts by working with the Obama administration on its planned cybersecurity goals, according to a new report from Forrester Research.

3 reasons why Obama's BlackBerry is a national security threat In a nut shell the BlackBerry service is too public to be used. Let's be rational here, how would you feel if you knew the president used a public copy of WindowsXP on all his PCs, or if he used a public copy of Internet Explorer and Outlook? How warm and fuzzy would you feel about the security of our gov’t secrets?

Google Apps gets better password protection Google has upgraded its security for Google Apps which allows users to avoid passwords favored by hackers in the latest wave of attacks.

Top 10 YouTube hacking videos Hacking for fun, profit and to meet women. These 10 YouTube hacker videos range from the humorous to the downright frightening. Some of them demonstrate live hacks, while others demonstrate the use of hacker tools.

Debit-card processor claims data breach part of global fraud operation Heartland Payment Systems, the Princeton, N.J.-based provider of credit and debit processing, payroll, check management and payments services to more than 250,000 business locations across the country, Tuesday disclosed it was the victim of a security breach.
Also: Banks warn debit card holders; processor acknowledges breach

Microsoft issues patches for 'nasty' Windows bugs Microsoft last week patched three vulnerabilities in the Server Message Block (SMB) file-sharing protocol in Windows, including two that could make "Swiss cheese" out of enterprise networks, according to one researcher.

Three years undercover with the identity thieves Salesmen and parents know the technique well. It's called the takeaway, and as far as Keith Mularski is concerned, it's the reason he kept his job as administrator of online fraud site DarkMarket.

Information security 'how not to's' It's not easy getting information security right. It is easy to get advice (often from vendors who want to sell you their semi-magic fix for all that ails you) on what you...

Virtualization security: So far nothing In April 2004 I wrote my first article on the topic of virtualization security. I was trying to bring attention to the security aspects of this "new" technology that was...

SafeNet buys Aladdin then announces merger The owners of the encryption specialist SafeNet announced last week that it will acquire Israeli security vendor Aladdin Knowledge Systems for $160 million (£109 million), with the intention of eventually merging the two security companies.

Embarrassing Insider Jobs Highlight Security, Privacy Holes Officials in San Francisco last summer found out just how easy it can be for one person to hold the city, or at least critical parts of its IT network, hostage for several days. In July, a disgruntled network administrator for the city locked up a multimillion-dollar municipal computer system that handles sensitive data. The employee, Terry Childs, refused to give up the password to the FiberWAN system, which he had helped design. Childs eventually gave the password to San Francisco mayor Gavin Newsom, but not before a lockout that lasted almost two weeks and cost the city close thousands of dollars to fix.

Cisco PIX to ASA configuration migration tool, time is running short Cisco releases a free migration tool for PIX to ASA migration ahead of the end-of-life for PIX on July 28.

January giveaways from Cisco Subnet and Microsoft Subnet
Up for grabs: Two Cisco training courses from Skyline-ATS worth up to $6,990, a Microsoft training course from New Horizons worth up to $2,500, 15 copies each of the hot book titles Microsoft SQL Server 2008 Management and Administration, IPv6 Security and Chained Exploits: Advanced Hacking Attacks. Get all the entry details here.


IT Outlook '09
Products of the WeekIn-depth analysis of the latest enterprise strategies, start-ups to watch, people to know, and more.

9 hot technologies for '09
9 hot technologies for '09Our annual rundown, plus a tip or two about how to approach each hot technology.

Sponsored by NetApp
rule

Deploying Microsoft Exchange Server 2007 with NetApp Networked Storage
Architecting and planning a Microsoft Exchange 2007 deployment is not a simple undertaking. Important decisions regarding servers, networking and storage must be made. Explore the considerations and challenges of an Exchange environment, as well as the holistic impact it will have on your entire IT infrastructure and business processes.

rule

Take Control of Network TCO by Automating IPAM
Join ESG and Infoblox to learn about reducing network TCO while boosting network availability by automating IPAM.
Review this information-packed webinar today.


Successfully Manage a Secure Database.
Database professionals are invited to join this Oracle Live Webcast on Thursday, February 5 at 2:00 p.m. ET/11:00 a.m. PT. Gain a better understanding of database security and how to more strategically work with security administrators. Don't miss out.
Register for this live webcast now.

 

01/21/09

Today's most-read stories:

  1. Where to watch Obama's inauguration online
  2. Bloggers give Obama marching orders
  3. Why HP is the 'Cisco of network mgmt. software'
  4. Cisco CTO could be tapped by Obama
  5. Obama's BlackBerry equals national security threat
  6. Microsoft layoffs could come next week
  7. U.S. plots major upgrade to Internet router security
  8. Mark Hopkins solves Vo-Fi challenge with smart antennas
  9. How Obama might get his way on BlackBerry
  10. Worm infects 1.1M Windows PCs in 24 hours


Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe in this Executive Guide. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies explained in this report.
Download this Executive Guide now.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment