Search This Blog

Friday, March 06, 2009

Beyond Downadup: Security expert worries about smart phone, TinyURL threats; Insider theft at NYPD

Malware writers just waiting for financial incentive to strike, F-Secure exec warns
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Oracle
rule

IDC: Preventing Enterprise Data Leaks at the Source
This IDC report presents a preemptive approach to information protection and control (IPC). It discusses the growing internal threats to business information, the impact of government regulations on the protection of data, and how enterprises must adopt database security best practices to prevent sensitive customer data or company information from being distributed within or outside the enterprise in violation of regulatory or company policies.

rule

Spotlight Story
Beyond Downadup: Security expert worries about smart phone, TinyURL threats

Bob Brown By Bob Brown
Downadup/Conficker worm has been a nightmare, but just wait until you see what malware writers have in store for smart phones and social network sites, security expert says Read full story

Related News:

Insider theft at New York Police Dept. impacts 80,000 cops Former director of communications for NYPD's pension fund is accused of stealing computer tapes containing sensitive information on about 80,000 current and retired police...

Windows security patches coming next week Microsoft will release three sets of security updates next Tuesday, fixing at least one critical bug in its Windows operating system.

IT pro gets four years for building botnets An employee of search engine startup Mahalo has been sentenced to four years in prison for infecting as many as 250,000 computers with malicious botnet computer code.

Microsoft: No patch for Excel zero-day flaw next week Microsoft Thursday said it will deliver three security updates on Tuesday, one of them marked "critical," but will not fix an Excel flaw that attackers are now exploiting.

Mozilla patches eight Firefox bugs, six critical Mozilla today patched eight security vulnerabilities in Firefox, half of them critical memory corruption flaws in the browser's layout and JavaScript engines.

How To Design Green And Secure Buildings Put a security guy in a room with an environmentalist and ask them to design a building. Wait five minutes and you'll hear fists pounding tables, chairs hitting walls and a steady flow of profanity.

Alcatel-Lucent frees Laptop Guardian from hardware cage Alcatel-Lucent has unteathered its Laptop Guardian from its usual hardware form factor and turned it into a software solution, after entering into an agreement with wireless broadband provider Novatel Wireless.

The Internet Protectors Guest writer Pat Bitton: We all know that there is a huge amount of variably accurate security information on the Web. There are many blogs, forums, bulletin boards, white papers, podcasts, and Webinars - some posted by vendors, others by enthusiastic volunteers. The trouble is, there is no coherent resource for all types of computer security information in one place that is appropriate for all levels of expertise. The arrival of social networking on the Internet provided the opportunity I'd been looking for to change this situation.

Enter for a Microsoft training giveaway from New Horizons
New Horizons Computer Training is offering a free Microsoft training course worth up to $2,500 to be given to one lucky Microsoft Subnet reader. Deadline for entry is March 31.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Best of the Tests 2009
Best of the Tests 2009Out of the more than 150 products tested, a baker's dozen rise to the top of the list.

Fave Raves
2009 Fave RavesSix readers dish on their must-have network products, from desktop systems to wireless access points.

Sponsored by Oracle
rule

IDC: Preventing Enterprise Data Leaks at the Source
This IDC report presents a preemptive approach to information protection and control (IPC). It discusses the growing internal threats to business information, the impact of government regulations on the protection of data, and how enterprises must adopt database security best practices to prevent sensitive customer data or company information from being distributed within or outside the enterprise in violation of regulatory or company policies.

rule

The Power of LAN Test Tools.
Successfully deploy a wired/wireless Ethernet network and keep it running with exceptional up-time. Ensure your network is ready for new technologies by running assessment tests that provide you with the data you need. Resolve connectivity issues and quickly address network performance complaints. Get all of the details today.
Download this whitepaper now.


Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies.
Download this Executive Guide now.

 

03/06/09

Today's most-read stories:

  1. Prototype wireless, robotic vacuum cleaner: hamster-powered
  2. Microsoft Windows on a mainframe?
  3. Helping to keep government's prying eyes at bay
  4. Network skills in demand, pay well in down economy
  5. Will Windows 7 make IE optional?
  6. Three nightmares when managing Macs
  7. New Satyam CEO assures customers about company's future
  8. User sues AT&T over $5,000 Web bill
  9. NWW readers: "We're not gonna pay a lot for this bandwidth!"
  10. Acer sees the future of smartphones as free
  11. Microsoft TechFest: Commute UX dialog system for in-car infotainment


Network World on Twitter: Get our tweets and stay plugged in to networking news


A Simplified Data Center - Live March 12
Contain costs and improve efficiency and reliability by simplifying your data center architecture. On March 12, data center design and implementation experts share in-depth advice on new approaches and examples of deployments - including price, performance and savings.
Register today for this Live Webcast.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: