Search This Blog

Friday, January 09, 2009

Microsoft to kick off 2009 with single security fix; The 5 Most Dangerous Security Myths

Social networks link terrorists; Fake CNN malware attack spins Gaza angle
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by AMD
rule

See the power of the new Quad-Core AMD Opteron(TM) processor.
Virtualization is a proven engine that drives business performance. The fusion of the Quad-Core AMD Opteron(TM) processor and virtualization - It's a match made in the data center. Find out more:

rule

Spotlight Story
Microsoft to kick off 2009 with single security fix

Robert McMillan By Robert McMillan
After being forced to rush out an emergency patch for its Internet Explorer browser last month, Microsoft plans to release just one security update in its first patch release of 2009. Read full story

Related News:

The 5 Most Dangerous Security Myths Still think that today's computer viruses and other malware come from some maladjusted teen out to vandalize your PC to make a name for himself? Think again. The persistent myth is a holdover from days long gone, and it's important to dispel it if you want to know what you're up against - and how to protect yourself.
The 5 Most Dangerous Security Myths: Myth #2
The 5 Most Dangerous Security Myths: Myth #3
The 5 Most Dangerous Security Myths: Myth #4
The 5 Most Dangerous Security Myths: Myth #5

Social networks link terrorists A new breed of terrorists are using online forums to recruit people who align themselves with the mission of Al Qaeda, creating global networks of would-be terrorists who pose a growing threat, a senior cyberterrorist researcher warned this week.

Fake CNN malware attack spins Gaza angle Hackers have launched a large-scale spam attack masquerading as CNN.com news notifications about the Israeli invasion of Gaza, security researchers said Thursday, in a repeat of a massive campaign last summer that also posed as CNN alerts.

E-mail snafu exposes names of confidential witnesses From the how-not-to-keep-a-secret department comes the tale of an official at U.S Attorney Patrick Fitzgerald's office in Chicago who inadvertently e-mailed a document containing the names of more than 20 confidential witnesses in a federal probe to the media.

Cisco warns of GSS DNS vulnerability Cisco is warning of a security hole in its Cisco Application Control Engine Global Site Selector (GSS) that could lead to a crash of the engine's DNS service.

Verizon service steps up analysis of security risks Verizon Business is boosting the vulnerability-scanning and risk-correlation capabilities in its managed security services lineup.

Clock ticking for gas stations to pump up data security Lower gas prices aren't the only thing that's new at the pumps these days. Data encryption tools are also becoming part of the picture.

Riding the downturn: Network vendors eye new markets in '09 Today's rough economy hasn't put the breaks on vendor ambition. Microsoft, Cisco, HP, VMware, Juniper and Avaya have big plans for 2009.

TJX Maxx hacker banged up for 30 years Maksym Yastremskiy, the Ukrainian accused of being a key figure in the infamous TJX Maxx Wi-Fi hack of 2005, has been sentenced to 30-years in prison by a Turkish court.

Destroy discarded hard drives, warn researchers Here's the next essential item in a sysadmin's equipment - a hammer. Too many PCs are still dumped with confidential data intact according to Which? Computing, information that would be very tempting to identity thieves.

Will Microsoft Corner the Desktop Security Market? Microsoft plans to offer a free antivirus product, code-named "Morro," in the second half of this year, when the company removes Windows Live OneCare from the retail market. But cautious consumers may want to keep their current antivirus programs, given Microsoft's dubious track record with antivirus apps.

January giveaways from Cisco Subnet and Microsoft Subnet
Up for grabs: Two Cisco training courses from Skyline-ATS worth up to $6,990, a Microsoft training course from New Horizons worth up to $2,500, 15 copies each of the hot book titles Microsoft SQL Server 2008 Management and Administration, IPv6 Security and Chained Exploits: Advanced Hacking Attacks. Get all the entry details here.


IT Outlook '09
Products of the WeekIn-depth analysis of the latest enterprise strategies, start-ups to watch, people to know, and more.

9 hot technologies for '09
9 hot technologies for '09Our annual rundown, plus a tip or two about how to approach each hot technology.

Sponsored by AMD
rule

See the power of the new Quad-Core AMD Opteron(TM) processor.
Virtualization is a proven engine that drives business performance. The fusion of the Quad-Core AMD Opteron(TM) processor and virtualization - It's a match made in the data center. Find out more:

rule

Effectively Managing Change.
Find the right network/system management platforms that leverage the latest IT technologies in this Executive Guide, "The New Network/System Management Challenges." Get a handle on server sprawl, managing 802.11n wireless LANs, and data center automation tool integration. Confidently deploy innovative technologies that drive efficiencies today.
Download this Executive Guide now.


Executive Guide: Green IT
Download this Network World Executive Guide, "Going Green: Trends, tips and case studies," for timely, real-world advice. By adopting an effective green approach to IT you'll save your company money and even bolster company profits. Find out how to make it happen today.
Download this Executive Guide now.

 

01/09/09

Today's most-read stories:

  1. Microsoft research projects to improve our lives
  2. Outlook '09
  3. IBM employees buzzing about layoff rumors
  4. AT&T builds $23M IPv6 network for U.S. military
  5. Is VoIP dead?
  6. 2009's 25 geekiest 25th anniversaries
  7. Nearly 1 million jobs could be created by IT stimulus package
  8. Sony rolls out Atom-powered mini-laptop
  9. Best iPhone apps: Office and personal productivity
  10. Asus reveals Eee Keyboard, M50 notebook with mini-screen


Network Security you Need
Zero in on the hottest security technologies you need to know about in this Executive Guide, "The Evolution of Network Security." Stay out in front with the most up-to-date information on network security. Better protect your IT environment with NAC, data leakage prevention controls and auditing tools.
Download this Executive Guide now.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: