Thursday, March 19, 2009

Rootkit code exploiting major Intel chip flaw to be posted today; Browsers get hacked before phones

The scariest, stealthiest, and most dangerous rootkit since the legendary Blue Pill
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by HP
rule

HP 5 Questions to Ask about Network Automation
Visibility into the global network is key to maximum uptime. You can't fix what you can't see and having a view into the global network ensures the ability to; identify and resolve problems quickly, prevent configuration mistakes, enforce best practices and manage the network from a central location. Learn what to ask when evaluating your network management system. Read this whitepaper today.

rule

Spotlight Story

Rootkit code exploiting major Intel chip flaw to be posted today
This is the scariest, stealthiest, and most dangerous rootkit I’ve seen come around since the legendary Blue Pill! No, I’m not just trying to sensationalize this or spread fear, uncertainty and doubt. This is serious and represents a massive new security threat for us all. Read more.

Related News:

Browsers get hacked before phones at security show Mobile devices took the spotlight at the CanSecWest security conference Wednesday, but it was browser bugs that got all the attention at the show's popular hacking contest.

FTC urged to investigate security of Google services An online privacy group is calling on the U.S. Federal Trade Commission to investigate whether Google is making deceptive claims over the security of data stored in cloud-computing services such as Gmail and Google Docs.

IT contractor indicted for sabotaging computer system An IT contract employee who formerly worked at an oil and gas production company in Long Beach, Calif., was indicted Tuesday on charges of sabotaging a computer system he helped set up because the company did not offer him a permanent job.

Microsoft releases IE8, stresses security Microsoft plans to make its Internet Explorer 8 browser available on Thursday, along with a company-commissioned report claiming IE8 is more secure against malware than rival browsers from Mozilla and Google.

LinkedIn Privacy Settings: What You Need to Know Since LinkedIn doesn't require you to share the same types of personal information as you do on Facebook, the service's privacy settings appear to be much more straightforward than its less business-oriented competitor. But if you leave the default settings in place, you might be surprised to know what information you make public on LinkedIn.

FishNet joins with Optenet for SaaS security Two security vendors have joined forces to offer a 'comprehensive' Security-as-a-Service offering for enterprises struggling to deal with the growing complexity of security threats, coupled with the fiscal pressures associated with the current economic downturn.

Auditor: U.S. SEC needs to improve cybersecurity The U.S. Securities and Exchange Commission (SEC) has taken steps to improve its information security, but it still hasn't corrected several vulnerabilities found in February 2008, according to an auditor's report.

A Real Dumpster Dive: Bank Tosses Personal Data, Checks Data protection is not just an IT security issue. But security industry analyst Steve Hunt, who heads up Hunt Business Intelligence, believes too many people in IT security still have that false perception.

Recover Your Laptop From Theft or Loss Let's talk about how you can protect your laptop when you travel...I have had my laptop stolen once, about four years ago, from the trunk of a locked car parked at a shopping mall. You never forget that experience of being violated, of being stupid.

Security management: 3 key considerations What should you ask when buying security information management software?

Enter for a Microsoft training giveaway from New Horizons
New Horizons Computer Training is offering a free Microsoft training course worth up to $2,500 to be given to one lucky Microsoft Subnet reader. Deadline for entry is March 31.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Exchange alternatives: Pros & cons
Clear Choice Test: Microsoft Exchange alternativesTesting shows Microsoft's Exchange still tops for features and management hooks.

App to no good
10 iPhone apps that could get you into troubleA look at the top 10 iPhone apps that could get you into trouble.

Sponsored by HP
rule

HP 5 Questions to Ask about Network Automation
Visibility into the global network is key to maximum uptime. You can't fix what you can't see and having a view into the global network ensures the ability to; identify and resolve problems quickly, prevent configuration mistakes, enforce best practices and manage the network from a central location. Learn what to ask when evaluating your network management system. Read this whitepaper today.

rule

Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies.
Download this Executive Guide now.


Webcast: Data center server selection.
Forrester Research's Brad Day helps IT professionals refine their server selection criteria in this informative Webcast, "Beyond Systems Performance." Ensure you will make the right decision for your next-generation data center. Get Day's tips on creating a cost-efficient environment that delivers the performance and long-term resiliency you require.
Watch this Webcast now.

 

03/19/09

Today's most-read stories:

  1. Computer science major is cool again
  2. Report: IBM is in talks to buy Sun
  3. Rootkit to exploit Intel chip flaw to be posted 3/19/09
  4. Apple previews Version 3.0 of iPhone OS
  5. Cisco rivals size up UCS with usual reaction: caveat emptor
  6. Google Voice: GrandCentral grows up!
  7. Road signs hacked in NYC
  8. What Cisco's UCS means to management vendors?
  9. Web inventor Berners Lee conned by fake Web site
  10. A 10-piece sampler from Microsoft's patent pipeline
  11. Students learn through robot battles


Network World on Twitter: Get our tweets and stay plugged in to networking news


The Need for an Adaptive Threat Management Architecture - Live March 31.
Create a more secure and efficient network. Find out how in this Live Webcast, "The Need for an Adaptive Threat Management Architecture." Join us on Tuesday, March 31, 2009, at 1:00 p.m. ET/10:00 a.m. PT. Get real-world advice from Jon Oltsik, senior analyst at consulting firm Enterprise Strategy Group.
Register today for this Live Webcast.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment