17 High-Risk Security Threats (And How to Fix Them) Network worms. Phishing e-mail. Drive-by downloads. Data sniffed from an open wireless network. To use a computer safely in the 21st century, you have to be prepared to combat a growing number of constantly evolving security threats. Plus: 17 High-Risk Security Threats (And How to Fix Them) How to Stop Operating-System Attacks How to Lock Down the Data in Your Apps How to Safeguard Your Online Security How to Beat Card Skimmer Scams, Other Money Drains How to Plug Security Holes in Your Browser How to Keep Your Cell Phone Info Private How to Protect Your Online Passwords ICANN ponders ways to stop scammy Web sites The overseer of the Internet's addressing system is soliciting ideas for how to fix a problem that is enabling spammers and fraudulent Web sites to flourish. IE8 Focuses on Improved Security and Privacy Microsoft's updated browser, Internet Explorer 8, promises an assortment of new features designed to help make Web browsing with IE safer, easier, and more compatible with Internet standards. We looked at the first release candidate of the new browser released to the public today, Release Candidate 1 (RC1). On the surface, IE 8 seems to be a lot like IE 7, but Microsoft has made a number of changes under the hood. You may have seen some of these new features already, however, in IE's no-longer-upstart competitor, Mozilla Firefox 3. Monster.com Breach: Evolution of a Disclosure Letter When Monster.com suffered a data breach last year, two disclosure letters went out to customers -- one from Monster itself and another from US AJOBS, a federal employment organization that relied on Monster.com databases for its job listings. Though they covered the same breach, each letter was starkly different. Safety Precautions for Monster.com Users after Hack Attack Monster.com announced on Friday that its database was illegally accessed, and that crooks lifted user data including "Monster user IDs and passwords, e-mail addresses, names, phone numbers, and some basic demographic data." The attack extended to the USAJobs federal site (usajobs.opm.gov), as Monster.com is a technology provider for that site. Security Firm Sees Alarming Rise in 'Transient' Threats Antivirus firm AVG Technologies says an alarming rise in the number of virus-laden sites that are here today and gone tomorrow is causing security experts to re-think traditional virus protection strategies. Cisco delivers security, storage and unified communications for small business Cisco this week unveiled products specifically for small companies as part of its recently announced $100 million commitment to that business market. Stop Internet Poachers from Stealing Your Wi-Fi Everyone has a different system for keeping their home networks secure. And by "secure" I mean "safe from cheapskate neighbors looking to poach some free Internet." What's the Conficker worm got to do with NAC? The Conficker worm doesn't directly have anything to do with NAC, but as is the case when any pervasive attack becomes high profile, vendors leap in to point out how their products could have prevented the problem. End regional lockout of products and services Microsoft Subnet blogger Tyson Kopcynski tells the story of how Amazon hasn't figured out it’s a big, global world. Who goes there? Identity management is all about who you are and what you should be allowed to do. This Product Guide describes the technology and how it works. January giveaways from Cisco Subnet and Microsoft Subnet Up for grabs: Two Cisco training courses from Skyline-ATS worth up to $6,990, a Microsoft training course from New Horizons worth up to $2,500, 15 copies each of the hot book titles Microsoft SQL Server 2008 Management and Administration, IPv6 Security and Chained Exploits: Advanced Hacking Attacks. Get all the entry details here. |
No comments:
Post a Comment