Tuesday, March 31, 2009

Conficker on April 1st: Eve of destruction or big joke?; Data Security: Whose Job Is It Really?

Firefox patches zero-day, hacking contest bugs; Hack contest sponsor confirms IE8 bug in final code
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Dell
rule

Windows Vista: A Cyber Security Shield
Windows Vista incorporates a number of new and enhanced security features that address spyware, security vulnerabilities and end user naivete.

rule

Spotlight Story
Conficker on April 1st: Eve of destruction or big joke?

Ellen Messmer By Ellen Messmer
Will the Conficker worm, set to activate April 1, do a lot of damage? Read full story

Related News:

Data Security: Whose Job Is It Really? Forrester has a recommendation for CISOs struggling with how to secure corporate data...

Cisco readies for Conficker worm The April 1 attack of the Conficker worm might just be an April Fool's prank, but Cisco isn't taking any chances -- its Threat operations Center will be monitoring the situation in the event that there is an actual attack.

3 Ways Pen Testing Helps DLP (and 2 Ways It Doesn't) Penetration testing's future has been caught in heated debate recently, sparked by Fortify Co-Founder and Chief Scientist Brian Chess' prediction that the practice would die off this year.

Smart grid, other environmental control systems not smart about security If lengthy requirements were a measure of success, then smart grid technology is well on its way to being an anomaly in the environmental controls space. But I'm not going to try to hold my breath for that to happen.

FAA exec offers blunt, scary assessment of its network security Its not often you hear a highly placed IT executive dump on his own network security let alone a person entrusted with as much riding on such a systems as the Federal Aviation Administration.

FBI: Computer crime cost $265M in 2008, an all-time high Online fraud and other computer schemes cost the U.S. $265 million - up from $239 million in 2007 or an average of average individual loss was $931. The FBI said 275,284 complaints were received in 2008 by the Internet Crime Complaint Center (IC3), and the National White Collar Crime Center (NW3C), up from 206,884 (33%) over 2007.

How to land a security sales engineering job Cisco Subnet blogger Jamey Heary has filled many different roles during his IT career. Find out why he thinks a security sales engineering position is the place to be right now.

Researchers exploit Conficker flaw to find infected PCs Just days before the Conficker worm is set to contact its controllers for new instructions, security researchers have discovered a flaw in the worm that makes it much easier for users to detect infected PCs.

Smart grid, other environmental control systems not smart about security If lengthy requirements were a measure of success, then smart grid technology is well on its way to being an anomaly in the environmental controls space. But I'm not going to try to hold my breath for that to happen.

GhostNet highlights evolving threat environment The high-profile disclosure over the weekend of the GhostNet cyberespionage ring that targeted 1,295 computers in more than 100 countries underscores how highly targeted and sophisticated attacks, often run by criminals, are changing the security landscape, according to a security researcher at Symantec.

Prevent intrusions: What to look for In the Buying Tips section of our Product Guide, find 15 questions to ask about IPS before you buy one.

Enter for a Microsoft training giveaway from New Horizons
New Horizons Computer Training is offering a free Microsoft training course worth up to $2,500 to be given to one lucky Microsoft Subnet reader. Deadline for entry is March 31.

Network World on Twitter Get our tweets and stay plugged in to networking news.


App to no good
10 iPhone apps that could get you into troubleA look at the top 10 iPhone apps that could get you into trouble.

CEO payday breakdown
CEO payday: How much tech chiefs made in '08A detailed account of how much tech chiefs made in 2008.

Sponsored by Dell
rule

Windows Vista: A Cyber Security Shield
Windows Vista incorporates a number of new and enhanced security features that address spyware, security vulnerabilities and end user naivete.

rule

The Need for an Adaptive Threat Management Architecture - Live March 31.
Create a more secure and efficient network. Find out how in this Live Webcast, "The Need for an Adaptive Threat Management Architecture." Join us on Tuesday, March 31, 2009, at 1:00 p.m. ET/10:00 a.m. PT. Get real-world advice from Jon Oltsik, senior analyst at consulting firm Enterprise Strategy Group.
Register today for this Live Webcast.


Network World's IT Resource Library
Whether you're looking to gear up on one specific topic or you're trying to stay current on several areas, Network World's resource library has what you're looking for. Our comprehensive collection of resources will make your job easier.
Visit Now

 

03/31/09

Today's most-read stories:

  1. Deep computer-spying network touched 103 countries
  2. Preparing for the Pre: Palm and Sprint must get it right
  3. Seven reasons MPLS has been wildly successful
  4. April Fool's Conficker threat is likely hype
  5. Google: IPv6 is easy, not expensive
  6. CEO payday: How much tech chiefs made in '08
  7. Top 10 technology skills
  8. Nine cool geek tips I just can't function without
  9. IETF to explore new routing technique
  10. IBM layoffs incite backlash
  11. Students learn through robot battles


Network World on Twitter: Get our tweets and stay plugged in to networking news


Create Your Own Agenda at IT Roadmap
Customize a day of learning just for yourself! Attend IT Roadmap Conference & Expo and explore new solutions and examine new technology across 10 relevant areas of IT. Security, Virtualization, SaaS, VoIP, Green IT and more. 10 U.S. cities in '09. Next up.. NYC-Feb, Denver-March, Chicago-April.
Select your city, register and attend free!



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment