Search This Blog

Tuesday, February 03, 2009

2008 was year of the SQL injection attack; NHS worm infection was 'entirely avoidable'

The year 2008 can be viewed as the year of the SQL injection attack
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Oracle
rule

Oracle: Information Security for Database Admins
Database professionals are invited to join this Oracle Live Webcast on Thursday, February 5 at 2:00 p.m. ET/11:00 a.m. PT. Gain a better understanding of database security and how to more strategically work with security administrators. Don't miss out. Register for this live webcast now

rule

Spotlight Story
2008 was year of the SQL injection attack: IBM

Ellen Messmer By Ellen Messmer
2008 was the year of the SQL injection attack, IBM's ISS "X-Force 2008 Trend statistics" report makes note. Read full story

Related News:

NHS worm infection was 'entirely avoidable', says review The infection of 4,700 PCs by a worm at three London hospitals in mid-November was "entirely avoidable," according to an independent security review.

911 fraudsters provoke, endanger public, law officers It's been a year since the FBI brought the problem to the public’s attention but it continues to plague: there has and continues to be a significant increase in the illegal activity know as “swatting” where criminals and pranksters call in a spoofed 911 call in hopes of drawing a response from law enforcement - usually a Special Weapons and Tactics (SWAT) team.

Some Incidents Can Make Life Interesting No security manager wishes for a security incident . They can be costly, disruptive and a professional black mark. But getting to the bottom of a minor event -- one that causes no real harm or has a minimal effect but isn't run-of-the-mill and therefore requires a bit of investigating -- can make the job more challenging. You have to figure out just what happened so that you can prevent a recurrence, and you have to do it quickly so that damage is kept to a minimum. It's a time-sensitive task that requires quick thinking and expertise. We just had an incident of that sort, and it's an interesting story.

Spotting a PC Infection It's a common fear, stoked by never-ending news of major threats like the Conficker worm and yet another Monster.com database hack: Is my computer infected with malware?

Are You Addicted to Information Insecurity? A recent study has a finding that defies reason: close to half of 154 smokers who had surgery to remove early stage lung cancer picked up a cigarette again within 12 months of their operation, and more than one-third were smoking at the one year mark.

Obama still won't say whether he's using a BlackBerry The mystery continues. President Barack Obama said in a television interview broadcast Monday he has a very secure handheld device, but he would not divulge whether or not he's still using his coveted BlackBerry .

IE or Firefox: Which Browser is More Secure The conventional wisdom in security circles used to be that Microsoft's Internet Explorer was hopelessly attack-prone and that only someone with a cyber death wish would prefer it over such alternatives as Mozilla Firefox, Opera or Apple's Safari browser.

Drive Makers Agree on TCG Encryption Standard The world's largest disk drive makers have pledged to support three new Trusted Computing Group (TCG) encryption standards for hard disk drives, solid-state drives and encryption-key management applications.

How does Cisco IronPort prevent directory harvest attacks? Tom Topping, director of federal operations for Cisco IronPort gives his take on how IronPort prevents directory harvest attacks.

IPv6 capabilities in Cisco’s IPS software version 6.2 Cisco Subnet blogger Scott Hogg assesses Cisco's support for IPv6 in the newest version of Cisco's Intrusion Prevention System.

VoIP security: Share your concerns? Introducing new Cisco Subnet blogger and VoIP security author Patrick Park. Tell him your VoIP concerns.

February giveaways from Cisco Subnet and Microsoft Subnet
Up for grabs: One American Express gift card worth $250 from Global Knowledge; One Microsoft training course worth $2,995 from Global Knowledge; 15 copies each of the hot book titles Voice over IP Security, and CCNA Wireless Official Exam Certification Guide and 15 copies of Exchange Server 2007 How-To: Real Solutions for Exchange Server 2007 SP1 Administrators. Get all the entry details here.


Betting on SuperNAP
In Las Vegas, data center takes power and cooling to the limitIn Las Vegas, data center takes power and cooling to the limit.

Hot spot safety tips
Top 10 hot spot safety tipsHow to protect laptop data at your local Wi-Fi hot spot.

Sponsored by Oracle
rule

Oracle: Information Security for Database Admins
Database professionals are invited to join this Oracle Live Webcast on Thursday, February 5 at 2:00 p.m. ET/11:00 a.m. PT. Gain a better understanding of database security and how to more strategically work with security administrators. Don't miss out. Register for this live webcast now

rule

Effectively Managing Change.
Find the right network/system management platforms that leverage the latest IT technologies in this Executive Guide, "The New Network/System Management Challenges." Get a handle on server sprawl, managing 802.11n wireless LANs, and data center automation tool integration. Confidently deploy innovative technologies that drive efficiencies today.
Download this Executive Guide now.


Successfully Manage a Secure Database.
Database professionals are invited to join this Oracle Live Webcast on Thursday, February 5 at 2:00 p.m. ET/11:00 a.m. PT. Gain a better understanding of database security and how to more strategically work with security administrators. Don't miss out.
Register for this live webcast now.

 

02/03/09

Today's most-read stories:

  1. Wi-Fi hot spot horrors
  2. NFL's IT chief gears up for his 25th Super Bowl
  3. Windows 7 will not sway XP users
  4. Top 10 worst uses for Windows
  5. Human error caused Google search bug
  6. Ex-Fannie Mae employee accused of planting computer time bomb
  7. Satyam claims 15 contracts signed in January
  8. Wi-Fi vs. prepaid 3G data dongles
  9. Verizon clips VoiceWing, releases wireline VoIP service
  10. Don't fear the penguin: A newbie's guide to Linux


Everybody says "Do more with less!"
But no one tells you how. We will and it costs nothing to find out at IT Roadmap Conference and Expo. Coming to 10 cities in 09 including New York in February, Denver in March, Chicago in April.
Register now, attend free



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: