Friday, February 13, 2009

Microsoft announces $250,000 Conflicker worm bounty; Los Alamos National Lab missing 67 computers

Conflicker/Downadup worm inspires industry posse to round it up
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Oracle
rule

Best Practices for a Data Warehouse with Oracle Database 11g
In order to ensure your Enterprise Data Warehouse "EDW" will perform optimally and scale as your data set grows, you need to get three fundamental elements of an EDW correct: the hardware configuration, the data model and the data loading process. By designing these three elements correctly, you can seamlessly scale out your EDW without having to constantly tune or tweak the system. This white paper provides a set of best practices and "how-to" examples for deploying a data warehouse on Oracle Database 11g and leveraging its best-of breed functionality.

rule

Spotlight Story
Microsoft announces $250,000 Conflicker worm bounty

Ellen Messmer By Ellen Messmer
The spreading Conflicker/Downadup worm is now viewed as such a significant threat that it's inspired the formation of a posse to stop it, with Microsoft leading the charge by offering a $250,000 reward to bring the Conflicker malware bad guys to justice. Read full story

Related News:

Task force tries to bust Downadup worm Nearly 20 technology companies and organizations are combining forces to disrupt the command-and-control infrastructure of the rapidly-spreading "Downadup" worm, prompted by infection rates of nearly 2.2 million machines each day.

Los Alamos National Lab missing 67 computers New Mexico-based Los Alamos National Laboratory (LANL) , the nation's leading nuclear weapons lab, once again finds itself the focus of concerns about potentially serious cybersecurity lapses.

A down economy increases threat of data walking out the door Moving into 2009, the number of layoffs and unemployed has multiplied as a result of the falling economy. Corporate data is at risk now more than ever and companies need to be sure they have reliable protection in place.

Tough Massachusetts data-privacy regulation facing revision The Massachusetts data-privacy regulation “201 CMR 17.00 Standards for the Protection of Personal Information of Residents of the Commonwealth” is undergoing revision that will soon be public as amendments to the law, according to the state’s general counsel.

IT, security funds find place in stimulus package The massive economic stimulus package that is working through Congress includes hundreds of millions of dollars for various IT and physical security projects, including $448 million for a new headquarters for the U.S. Department of Homeland Security .

HP, IBM push new OASIS encryption key standard A group of industry vendors, led by IBM, HP and EMC, is proposing a new standard to make their encryption management software work together.

FTC sticks with online advertising self-regulation A new report by the U.S. Federal Trade Commission has expanded the agency's guidelines for online marketers engaged in behavioral advertising, but critics suggested the report doesn't do enough to protect consumer privacy.

February giveaways from Cisco Subnet and Microsoft Subnet
Up for grabs: One American Express gift card worth $250 from Global Knowledge; One Microsoft training course worth $2,995 from Global Knowledge; 15 copies each of the hot book titles Voice over IP Security, and CCNA Wireless Official Exam Certification Guide and 15 copies of Exchange Server 2007 How-To: Real Solutions for Exchange Server 2007 SP1 Administrators. Get all the entry details here.


IT & social networks
where IT pros do their social networkingSurvey takes a look at where IT pros do their social networking.

Hot spot safety tips
Top 10 hot spot safety tipsHow to protect laptop data at your local Wi-Fi hot spot.

Sponsored by Oracle
rule

Best Practices for a Data Warehouse with Oracle Database 11g
In order to ensure your Enterprise Data Warehouse "EDW" will perform optimally and scale as your data set grows, you need to get three fundamental elements of an EDW correct: the hardware configuration, the data model and the data loading process. By designing these three elements correctly, you can seamlessly scale out your EDW without having to constantly tune or tweak the system. This white paper provides a set of best practices and "how-to" examples for deploying a data warehouse on Oracle Database 11g and leveraging its best-of breed functionality.

rule

Effectively Managing Change.
Find the right network/system management platforms that leverage the latest IT technologies in this Executive Guide, "The New Network/System Management Challenges." Get a handle on server sprawl, managing 802.11n wireless LANs, and data center automation tool integration. Confidently deploy innovative technologies that drive efficiencies today.
Download this Executive Guide now.


Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies.
Download this Executive Guide now.

 

02/13/09

Today's most-read stories:

  1. Evolution of PCs, Macs, Internet, routing, cell phones, Microsoft Windows
  2. Largest coordinated ATM rip-off ever nets $9+ million
  3. Palm pulls the plug on Palm OS, bets the future on Pre's webOS
  4. NSA identifies top 25 programming errors
  5. Shareholders say Microsoft squanders billions on R&D projects
  6. WiMAX coverage to reach 800 million by 2010
  7. WAN critical to virtualization's payoff
  8. Tech layoffs: The real numbers aren't so bad
  9. FAA network hacked
  10. Cisco: Mobile data traffic to grow 66-fold by 2013


Product Guides
Get side-by-side product comparisons, buying tips, market trend information, case studies and more with Network World's Patch Management Product Guide.
Visit now



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment