Search This Blog

Friday, February 06, 2009

IT security jobs largely untouched by economy; Identity thieves beat Obama to stimulus package punch

"Geeks" get tap on wrist for data security problems; 4 security updates coming from Microsoft
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Oralce
rule

IDC: Oracle's X Factor: HP Oracle Exadata Storage Server and HP Oracle Database Machine
Oracle's recently announced hardware products, HP Oracle Exadata Storage Server and HP Oracle Database Machine, stand to shake-up the IT industry in several areas. If the product claims and initial disclosures about throughput are affirmed through further testing, customers will be induced to use more Oracle Database for data warehousing by the attraction of a predefined and supported configuration. Read this white paper to learn more about IDC's opinion of the HP Oracle Exadata Storage Server and the HP Oracle Database Machine.

rule

Spotlight Story
Researchers: IT security jobs largely untouched by economy

By Jaikumar Vijayan
Information security jobs may not be the most glamorous ones in the technology industry. But at least they appear to be a lot more secure than many other IT positions are during the ongoing economic recession . Read full story

Related News:

Identity thieves beat Obama to stimulus package punch Although the U.S. government's economic stimulus package hasn't even gotten out of Congress, scammers aren't waiting; they've launched multiple campaigns that tempt users into revealing personal information, a security researcher warned Thursday.

"Geeks" get tap on wrist for data security problems Electronics company Compgeeks.com got a light upbraiding from the Federal Trade Commission as it agreed to settle charges that it violated federal law by failing to provide reasonable security to protect sensitive customer data.

New App Lets Spammers Target Twitter Twitter may not being making any money yet, but that hasn't stopped spammers from trying to benefit from the micro-blogging service. In fact, a new software tool, called Tweet Tornado, has the unfortunate potential to be a real game changer. Launched last week, TT is designed to help spammers and malware distributors get the most out of their Twit-based offenses.

Four security updates due from Microsoft next week Microsoft plans to patch critical flaws in its Internet Explorer and Microsoft Exchange Server software next week.

Microsoft cites 'click fatigue' for Windows 7 security change Microsoft changed the default settings of one of its most important security features for Windows 7 because users balked at clicking more than two prompts a day, a company executive said Thursday.

VoIP Security: The Basics With the continuing pressure to reduce fixed costs within business, enterprises and SMBs are looking at VoIP as an opportunity for cost savings. There is increasing data verifying that the use of IP as a common transport for data and voice will provide a foundation for existing services such as voice traffic, and be a vehicle for new applications in the future such as presence and video.

EMC, Microsoft extend partnership on virtualization, security and content management EMC and Microsoft have extended a partnership that focuses on interoperability of products related to virtualization, security and content management.

Porn site feud spawns new DNS attack A scrap between two pornographic Web sites turned nasty when one figured out how to take down the other by exploiting a previously unknown quirk in the Internet's Domain Name System (DNS).

Podcast: Cisco warns of WLAN flaws; IT security jobs relatively safe in this economy Cisco today issued a security alert warning of a quartet of vulnerabilities affecting all of its wireless LAN controllers; Information security jobs may not be the most glamorous ones in the technology industry. But at least they appear to be a lot more secure. (5:31)

Privacy group calls Google Latitude a 'danger' to security A privacy group is calling Google's new mapping application an "unnecessary danger" to users' security and privacy.

Tories ignoring open-source security risk The British Conservative Party was wrong to slate the U.K. Government for its approach to open source, and U.S. outfit Fortify Software has come up with research to prove it. The bottom line: open source is just too risky anyway.

Pshaw on Microsoft's UAC A study from a third-party security vendor says that disabling admin rights is the sure-fire way to make Windows and IE 90% safer.

Microsoft changes Windows 7 UAC due to new exploit code A pair of Windows bloggers posted more proof-of-concept code today that subverts an important security feature of Windows 7 , a problem Microsoft knew about as long ago as last October and which one of its software engineers said would be fixed in the beta.

Confounded nonsense A study sponsored by Cisco and carried out by InsightExpress using responses from more than 2,000 respondents in 10 countries indicated that accidental and deliberate violations of security by insiders are a serious threat to data confidentiality.

February giveaways from Cisco Subnet and Microsoft Subnet
Up for grabs: One American Express gift card worth $250 from Global Knowledge; One Microsoft training course worth $2,995 from Global Knowledge; 15 copies each of the hot book titles Voice over IP Security, and CCNA Wireless Official Exam Certification Guide and 15 copies of Exchange Server 2007 How-To: Real Solutions for Exchange Server 2007 SP1 Administrators. Get all the entry details here.


Betting on SuperNAP
In Las Vegas, data center takes power and cooling to the limitIn Las Vegas, data center takes power and cooling to the limit.

Hot spot safety tips
Top 10 hot spot safety tipsHow to protect laptop data at your local Wi-Fi hot spot.

Sponsored by Oralce
rule

IDC: Oracle's X Factor: HP Oracle Exadata Storage Server and HP Oracle Database Machine
Oracle's recently announced hardware products, HP Oracle Exadata Storage Server and HP Oracle Database Machine, stand to shake-up the IT industry in several areas. If the product claims and initial disclosures about throughput are affirmed through further testing, customers will be induced to use more Oracle Database for data warehousing by the attraction of a predefined and supported configuration. Read this white paper to learn more about IDC's opinion of the HP Oracle Exadata Storage Server and the HP Oracle Database Machine.

rule

Effectively Managing Change.
Find the right network/system management platforms that leverage the latest IT technologies in this Executive Guide, "The New Network/System Management Challenges." Get a handle on server sprawl, managing 802.11n wireless LANs, and data center automation tool integration. Confidently deploy innovative technologies that drive efficiencies today.
Download this Executive Guide now.


Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies.
Download this Executive Guide now.

 

02/06/09

Today's most-read stories:

  1. Social engineering: Anatomy of a hack
  2. Cisco is not ruling out layoffs
  3. Nortel still signing up customers
  4. Security problems in the Treasury Department
  5. Cisco warns of four WLAN controller vulnerabilities
  6. VMware goes open source with desktop virtualization release
  7. Skype upgrade makes video calls easier
  8. BlackBerry gets thin with the 8900
  9. Optical chip could lead to terabit Ethernet
  10. Need a supercomputer? This guy builds 'em himself


Compare Security Information Management Products
Get side-by-side product comparisons, buying tips, market trend information, case studies and more with Network World's newly enhanced Security Information Management Product Guide.
Visit now



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: