Thursday, February 12, 2009

Microsoft update takes on spam-spewing botnet; BitDefender partner site hit by hackers

Last call for Anheuser-Busch IT guy; Undercover: The Company that Did Everything Wrong
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Oracle
rule

Best Practices for a Data Warehouse with Oracle Database 11g
In order to ensure your Enterprise Data Warehouse "EDW" will perform optimally and scale as your data set grows, you need to get three fundamental elements of an EDW correct: the hardware configuration, the data model and the data loading process. By designing these three elements correctly, you can seamlessly scale out your EDW without having to constantly tune or tweak the system. This white paper provides a set of best practices and "how-to" examples for deploying a data warehouse on Oracle Database 11g and leveraging its best-of breed functionality.

rule

Spotlight Story
Microsoft update takes on spam-spewing botnet

Robert McMillan By Robert McMillan
Microsoft has beefed up the Malicious Software Removal Tool (MSRT) that ships with its Windows operating system so that it will detect and root out the notorious Srizbi botnet code. Read full story

Related News:

BitDefender partner site hit by hackers Hackers elicited customer details from a Portuguese partner site associated with the security company BitDefender, the second intrusion in recent days targeting computer security companies.

Last call: Anheuser-Busch IT guy tossed into prison for computer theft An ex-IT consultant for Anheuser-Busch this week got 18 months in prison and was ordered to pay $377,000 in restitution for swiping nearly $400,000 worth of the beer giant's computer gear.

Undercover: The Company that Did Everything Wrong The plane landed late afternoon at a small airport in California that looked like it could have been a scene from a 1960s movie. My team and I walked down the metal stairs (no Jetway at this airport) and across the tarmac to the one-and-only baggage claim carousel.

Hacker challenge takes aim at browsers, smartphones The hacking contest that has grabbed headlines two years running will take aim next month at browsers and smartphones, according to the security company that sponsors the "PWN2OWN" challenge.

VoIP security flaw: Call flooding attack Cisco Subnet blogger Patrick Park continues his series on VoIP vulnerabilities with a look one of the most common attacks.

Obama inauguration guarded by high-def video system The presidential inauguration event last month was guarded with an advanced video-surveillance system used by local and federal law enforcement to watch over both President...

Security expert: Microsoft should cut IE's links to Windows Microsoft would better protect users by severing Internet Explorer 's connections to Windows, then patching the browser invisibly in the background -- daily if necessary, a security expert argued Tuesday.

MobileMe users targeted in phishing scam again Macs may be all but immune to viruses, but its users are still vulnerable to classic phishing schemes. You may remember that last summer a suspicious e-mail was going around to MobileMe account holders. Made to look like an official communication from Apple, it informed the user that their payment had failed to go through, and linked them to a site where they could fill in their credit card info, which would then of course be used in nefarious ways.

Start-up Talis targets desktop security Start-up Talis Data Systems introduces PC hardware that controls use of USB storage devices and access to networks based on defined user privileges.

NSA identifies top 25 programming errors The National Security Agency, working with MITRE Corp., SANS, and dozens of industry experts from many other organizations, has published a valuable list of the top 25 most dangerous programming errors.

RIM releases patch for buggy ActiveX control Research iIn Motion has patched a piece of software for Windows PCs that could leave them vulnerable to attack when loading new applications onto BlackBerry devices.

February giveaways from Cisco Subnet and Microsoft Subnet
Up for grabs: One American Express gift card worth $250 from Global Knowledge; One Microsoft training course worth $2,995 from Global Knowledge; 15 copies each of the hot book titles Voice over IP Security, and CCNA Wireless Official Exam Certification Guide and 15 copies of Exchange Server 2007 How-To: Real Solutions for Exchange Server 2007 SP1 Administrators. Get all the entry details here.


IT & social networks
where IT pros do their social networkingSurvey takes a look at where IT pros do their social networking.

Hot spot safety tips
Top 10 hot spot safety tipsHow to protect laptop data at your local Wi-Fi hot spot.

Sponsored by Oracle
rule

Best Practices for a Data Warehouse with Oracle Database 11g
In order to ensure your Enterprise Data Warehouse "EDW" will perform optimally and scale as your data set grows, you need to get three fundamental elements of an EDW correct: the hardware configuration, the data model and the data loading process. By designing these three elements correctly, you can seamlessly scale out your EDW without having to constantly tune or tweak the system. This white paper provides a set of best practices and "how-to" examples for deploying a data warehouse on Oracle Database 11g and leveraging its best-of breed functionality.

rule

Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies.
Download this Executive Guide now.


Preparing for IPv6.
Get concrete facts on what IPv6 adoption means for your organization in this Executive Guide. Learn how IPv6 and IPv4 can coexist and the role of NAT devices in this new world. Find out if you need to develop a business case today and how to get started.
Download this Executive Guide now.

 

02/12/09

Today's most-read stories:

  1. Largest coordinated ATM rip-off ever nets $9+ million
  2. Shareholders say Microsoft squanders billions on R&D projects
  3. Evolution of PCs, Macs, Internet, routing, cell phones, Microsoft Windows
  4. Google's Latitude: Not new, but worrisome
  5. FAA network hacked
  6. A few clean words from the creator of Cursebird
  7. Nortel to shed shareholders meeting, more employees
  8. Kaspersky says Web hack 'should not have happened'
  9. Google adds ActiveSync to accommodate iPhone, Win Mobile
  10. IBM, Juniper join in cloud strategy


Product Guides
Get side-by-side product comparisons, buying tips, market trend information, case studies and more with Network World's Patch Management Product Guide.
Visit now



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment