Wednesday, March 25, 2009

Chrome beats back hack attacks; Melissa virus turning 10; 8 Great Free Security Tools

Pwn2Own browser hacking competition is over, and just one browser was left standing: Google's Chrome
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by HP
rule

HP 5 Questions to Ask about Network Automation
Visibility into the global network is key to maximum uptime. You can't fix what you can't see and having a view into the global network ensures the ability to; identify and resolve problems quickly, prevent configuration mistakes, enforce best practices and manage the network from a central location. Learn what to ask when evaluating your network management system. Read this whitepaper today.

rule

Spotlight Story

Chrome beats back hack attacks
The third annual Pwn2Own browser hacking competition is over, and just one browser was left standing: Google's Chrome. And that's pretty surprising, especially since Chrome has been pilloried of late due to its lack of security features. But with Chrome, it's not so much about its vulnerabilities - something all software has to some extent - but its lack of ways to exploit them. Read more.

Related News:

Melissa virus turning 10...(age of the stripper unknown) Melissa was an e-mail macro virus like none before it: self-propagating, crippling to hundreds of networks...and named after an exotic dancer. When the 10th anniversary of its explosive debut occurs Thursday, Melissa's namesake - a stripper who had impressed virus writer David L. Smith - may opt to celebrate her notoriety quietly. IT pros who had to deal with the mess are more likely to curse her name.

101 Great Free Sites and Downloads In these tough times, the notion of free becomes more attractive than ever. We've sifted through the Web to find and test 101 of the best free downloads and services out there. We concentrated on utilities and other helpers that can rev up your smartphone's performance, streamline your social networking experience, and tame your PC while bending Windows to your will.
Plus:
8 Great Free Security Tools Your PC is under attack on all fronts.

China becoming the world's malware factory With China's economy cooling down, some of the country's IT professionals are turning to cybercrime, according to a Beijing-based security expert.

Facebook holds the line against spammers, scammers Facebook is shoring up its security protection procedures as the social-networking site increasingly comes under attacks from spammers, data thieves and other tricksters, according to the company's chief privacy officer.

Compass Award Winners: Security Leadership In Trying Times These are trying times. To say budgets are tight would be a severe understatement when, in fact, many businesses are struggling simply to survive in this economy. Current conditions make it even harder for security, which in so many companies is still seen as an unfortunate expense mandated by government regulations.
Compass Awards: Robert Rodriguez
Cancilla: Security Must Put Business First
Pethia: InfoSec's Challenges, Changes
Fleury: Insider Threat is the 'Weakest Link'

Sipera gear protects Microsoft OCS when used in unified communications At VoiceCon Orlando next week, Sipera will announce that its unified communications security gear supports Microsoft Office Communications Server, enabling businesses to safely extend OCS to telecommuters and business partners.

German police: Two-factor authentication failing A two-factor authentication system widely used in Germany is failing to stop cybercriminals from draining bank accounts, a top German law enforcement official said Tuesday.

In poor economy, IT pros could turn to e-crime Enterprises increasingly feel their employees will be more willing to steal data or sell insider knowledge due to the poor economy, according to an annual security survey conducted by KPMG.

Tufin adds white lists to firewall management platform Tufin Technologies is upgrading its firewall-management software to include white listing as a way to determine what types of traffic are allowed through corporate firewalls and as a means of safeguarding essential business functions.

Enterprises still neglecting WLAN security Most European enterprises are neglecting their wireless LAN security, with an alarming number using only the most basic security protection for their wireless networks.

Curious about the latest security news? Cisco subnet blogger Jameys Heary points the way to a free weekly overview of what's happening in the security world, courtesy of Cisco’s Intellishield group.

Security management: 3 key considerations What should you ask when buying security information management software?

Enter for a Microsoft training giveaway from New Horizons
New Horizons Computer Training is offering a free Microsoft training course worth up to $2,500 to be given to one lucky Microsoft Subnet reader. Deadline for entry is March 31.

Network World on Twitter Get our tweets and stay plugged in to networking news.


App to no good
10 iPhone apps that could get you into troubleA look at the top 10 iPhone apps that could get you into trouble.

CEO payday breakdown
CEO payday: How much tech chiefs made in '08A detailed account of how much tech chiefs made in 2008.

Sponsored by HP
rule

HP 5 Questions to Ask about Network Automation
Visibility into the global network is key to maximum uptime. You can't fix what you can't see and having a view into the global network ensures the ability to; identify and resolve problems quickly, prevent configuration mistakes, enforce best practices and manage the network from a central location. Learn what to ask when evaluating your network management system. Read this whitepaper today.

rule

Case Study: Successful LAN Support
Successfully deploy a wired/wireless Ethernet network and keep it running with exceptional up-time. Ensure your network is ready for new technologies by running assessment tests that provide you with the data you need. Resolve connectivity issues and quickly address network performance complaints. Get all of the details today.
Download this whitepaper now.


The Need for an Adaptive Threat Management Architecture - Live March 31.
Create a more secure and efficient network. Find out how in this Live Webcast, "The Need for an Adaptive Threat Management Architecture." Join us on Tuesday, March 31, 2009, at 1:00 p.m. ET/10:00 a.m. PT. Get real-world advice from Jon Oltsik, senior analyst at consulting firm Enterprise Strategy Group.
Register today for this Live Webcast.

 

03/25/09

Today's most-read stories:

  1. What is Nortel up to?
  2. Skype for SIP targets business customers
  3. Linux penguin mascot gives way to Tuz
  4. No business case for IPv6, survey finds
  5. 10 IE browser settings for safer surfing
  6. Rootkit to exploit Intel chip flaw to be posted 3/19/09
  7. Net neutrality debate spills over to broadband stimulus
  8. Cold-boot attacks change the data leakage landscape
  9. Hidden commands
  10. CEO payday: How much tech chiefs made in '08
  11. Students learn through robot battles


Network World on Twitter: Get our tweets and stay plugged in to networking news


Webcast: Data center server selection.
Forrester Research's Brad Day helps IT professionals refine their server selection criteria in this informative Webcast, "Beyond Systems Performance." Ensure you will make the right decision for your next-generation data center. Get Day's tips on creating a cost-efficient environment that delivers the performance and long-term resiliency you require.
Watch this Webcast now.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment