Search This Blog

Thursday, March 12, 2009

Preparing for the next Conficker; Bad Symantec update leads to trouble

Ways that IT and security pros can prepare their systems for the next Conficker variant
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Trend Micro
rule

An Effective Security Strategy.
Reduce the complexity of your security approach while improving your defenses and lowering costs. Find out how in this whitepaper, "Lower Security Risks and Costs by Minimizing the Time to Protection." Reduce the complexity in acquiring, deploying, and managing security with a combination of hosted services and products.

rule

Spotlight Story

Preparing for the next Conficker
Keith Shaw talks with Mike Paquette from Top Layer Security about ways that IT and security pros can prepare their systems for the next Conficker variant or worm that comes looking to wreak havoc on their systems. (16:30) Listen now.
Also see:
Symantec identifies third, more aggressive Downadup/Conficker variant
Beyond Downadup: Security expert worries about smart phone, TinyURL threats

Related News:

Bad Symantec update leads to trouble Symantec says a buggy diagnostic program spurred a rash of Norton antivirus user complaints late Monday and Tuesday morning.

Cisco Type A phones and daylight savings bug Cisco Type A phones in Cisco Unified Communications Manger versions after 5.1 have a bug with daylight savings, reports Cisco Subnet blogger Dennis Hartmann.

Biometrics: 3 Tips for Success Biometric security systems can, at first glance, seem futuristic. In some minds, they are still the stuff of science fiction. Biometrics are often criticized as being expensive and not practical in many business settings. But at Parkview Adventist Medical Center in Brunswick, Maine, Chief Technology Officer Bill McQuaid can't stop crowing about the success he has seen with the facility's biometric system.

Microsoft puts the kibosh on Facebook worm Koobface Microsoft is trying to stamp out the Koobface worm, which has spread aggressively on social networking sites such as Facebook and MySpace, the company said Tuesday.

Resignation exposes opposition to NSA cybersecurity role Last Friday's disclosure that Rod Beckstrom is resigning from his position as one of the federal government's top cybersecurity executives has exposed widespread - though not universal - opposition to the National Security Agency's expanding role in domestic cybersecurity issues.

Verizon lands massive $2.5 billion DoD service contract Verizon Business has signed a contract that could be worth up to $2.5 billion to provide telecom services to U.S. military installations around the world.

Legal officials to get training in e-evidence, e-crime Prosecutors and judges are having a hard time understanding computer crime, but a training course under way in 14 countries is aiming to improve how legal systems deal with cybercrime.

Antiphishing group develops e-crime reporting tool A group dedicated to fighting phishing scams has developed a way for police and other organizations to report e-crimes in a common data format readable by a Web browser or other application.

Top Trends: Patch Management Find out how patch-management products work, and what they can do for you, in this Product Guide.

Enter for a Microsoft training giveaway from New Horizons
New Horizons Computer Training is offering a free Microsoft training course worth up to $2,500 to be given to one lucky Microsoft Subnet reader. Deadline for entry is March 31.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Best of the Tests 2009
Best of the Tests 2009Out of the more than 150 products tested, a baker's dozen rise to the top of the list.

Fave Raves
2009 Fave RavesSix readers dish on their must-have network products, from desktop systems to wireless access points.

Sponsored by Trend Micro
rule

An Effective Security Strategy.
Reduce the complexity of your security approach while improving your defenses and lowering costs. Find out how in this whitepaper, "Lower Security Risks and Costs by Minimizing the Time to Protection." Reduce the complexity in acquiring, deploying, and managing security with a combination of hosted services and products.

rule

Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies.
Download this Executive Guide now.


Webcast: Data center server selection.
Forrester Research's Brad Day helps IT professionals refine their server selection criteria in this informative Webcast, "Beyond Systems Performance." Ensure you will make the right decision for your next-generation data center. Get Day's tips on creating a cost-efficient environment that delivers the performance and long-term resiliency you require.
Watch this Webcast now.

 

03/12/09

Today's most-read stories:

  1. Inexpensive scanners can 'fingerprint' paper
  2. Broadband stimulus funding timeline set by government
  3. Microsoft releases three updates for Windows
  4. Microsoft Windows on a mainframe?
  5. AT&T earmarks $11 billion for wireless, wireline broadband in '09
  6. Exchange alternatives: Pros and cons
  7. Google clarifies stance on paid apps
  8. Chinese newspaper says Apple prepping touch-screen netbook
  9. Gigabit Ethernet is the one bright spot
  10. Google blocks popular iPhone SMS app
  11. Microsoft TechFest: Commute UX dialog system for in-car infotainment


Network World on Twitter: Get our tweets and stay plugged in to networking news


The Need for an Adaptive Threat Management Architecture - Live March 31.
Create a more secure and efficient network. Find out how in this Live Webcast, "The Need for an Adaptive Threat Management Architecture." Join us on Tuesday, March 31, 2009, at 1:00 p.m. ET/10:00 a.m. PT. Get real-world advice from Jon Oltsik, senior analyst at consulting firm Enterprise Strategy Group.
Register today for this Live Webcast.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: