Search This Blog

Thursday, April 02, 2009

2008 was not a good year

ScanSafe's Annual Global Threat Report
Network World logo

Security Strategies Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Oracle
rule

The Cost of Securing your Database
Former Gartner analyst and founder of security consulting firm Securosis, Rich Mogull will explain how to make the most of IT security and compliance dollars by ensuring your databases are secure. Learn concrete tips and recommendations in this Live Webcast Thursday, April 16, 2009 at 2:00 p.m. ET/11:00 a.m. PT. entitled "Cost-Efficient Security and Compliance." Register Today.

rule

Spotlight Story
2008 was not a good year

M. E. Kabay By M. E. Kabay
"I told you so" is not exactly the favorite comment for anyone to hear, but unfortunately sometimes it has to be said. ScanSafe starts its 2008 Annual Global Threat Report with some depressing comments. Read full story

M. E. Kabay, PhD, CISSP-ISSMP, specializes in security and operations management consulting services. CV online.

Related News:

2008 was year of the SQL injection attack: IBM The year 2008 can be viewed as the year of the SQL injection attack, according to IBM's Internet Security Systems "X-Force 2008 Trend Statistics" report issued Monday.

Group takes Conficker fight to a new level Forming a global alliance to fight cybercrime isn't easy, and building an organization that can stay one step ahead of cyber crooks in more than 100 countries is close to impossible. But a band of volunteers calling itself Conficker Working Group thinks it can do it.

Do I own my machine? The built-in Webcam light is on. It shouldn't be on. I'm not using any recording, video-conferencing or photo applications. Why is it on? Is someone watching me? It's at times like this I get the eerie feeling that I don't actually, fully and completely own my machine. Turns out it was a driver problem, all fixed now. But I still can't shake that feeling.

Conficker Worm: Has the Hype Been Worth It? Cisco Subnet welcomes new guest blogger, security expert Andrew Whitaker. Whitaker notes that the Conficker worm seems not to have been the big, bad threat that so scared the industry.

Koobface worm to users: Be my Facebook friend A worm that hit Facebook last December has resurfaced, a security researcher said today, and is now hijacking user accounts -- not only for that social networking service, but also for MySpace, Friendster, LiveJournal and others.

GhostNet highlights evolving threat environment The high-profile disclosure over the weekend of the GhostNet cyberespionage ring that targeted 1,295 computers in more than 100 countries underscores how highly targeted and sophisticated attacks, often run by criminals, are changing the security landscape, according to a security researcher at Symantec.

Podcast: Avoiding the 5 Traps of eDiscovery Is your data retention and e-mail archiving system up to date with the latest rules and regulations concerning electronic discovery (eDiscovery)? Keith Shaw talks with Rick Dales of Proofpoint about some of the hidden pitfalls surrounding eDiscovery. Find out if you're ready before the lawyers come calling. (14:27)

Intrusion prevention strategies for 11n There are several ways to scan your 802.11n air environment for nasty goings-on. At a glance, the options seem pretty straightforward. However, you need to look carefully under the hood to draw a true apples-to-apples comparison of the accuracy and cost of the various offerings.

Deep computer-spying network touched 103 countries A 10-month cyberespionage investigation has found that 1,295 computers in 103 countries and belonging to international institutions have been spied on, with some circumstantial evidence suggesting China may be to blame.

Prevent intrusions: What to look for In the Buying Tips section of our Product Guide, find 15 questions to ask about IPS before you buy one.

April giveaways galore
Cisco Subnet
and Microsoft Subnet are giving away training courses from Global Knowledge, valued at $2,995 and $3,495, and have copies of three hot books up for grabs: CCVP CIPT2 Quick Reference by Anthony Sequeira, Microsoft Voice Unified Communications by Joe Schurman and Microsoft Office 2007 On Demand by Steve Johnson. Deadline for entries April 30.

Network World on Twitter Get our tweets and stay plugged in to networking news.


App to no good
10 iPhone apps that could get you into troubleA look at the top 10 iPhone apps that could get you into trouble.

CEO payday breakdown
CEO payday: How much tech chiefs made in '08A detailed account of how much tech chiefs made in 2008.

Sponsored by Oracle
rule

The Cost of Securing your Database
Former Gartner analyst and founder of security consulting firm Securosis, Rich Mogull will explain how to make the most of IT security and compliance dollars by ensuring your databases are secure. Learn concrete tips and recommendations in this Live Webcast Thursday, April 16, 2009 at 2:00 p.m. ET/11:00 a.m. PT. entitled "Cost-Efficient Security and Compliance." Register Today.

rule

Create Your Own Agenda at IT Roadmap
Customize a day of learning just for yourself! Attend IT Roadmap Conference & Expo and explore new solutions and examine new technology across 10 relevant areas of IT. Security, Virtualization, SaaS, VoIP, Green IT and more. 10 U.S. cities in '09. Next up.. NYC-Feb, Denver-March, Chicago-April.
Select your city, register and attend free!


Complimentary DNS newsletter
Sign-up today and receive the latest DNS news and analysis. This newsletter provides deep insight into this murky area and offers ways to understand and mitigate risk with better management and control of your domain, email and DNS.
Sign up now

 

04/02/09

Today's most-read stories:

  1. Conficker activation passes quietly, but threat isn't over
  2. Some UltraDNS customers knocked offline by attack
  3. 15 foolish high-tech stories
  4. Five best router and switch features you never use
  5. Mobile Skype: The end of cellular as we know it
  6. Top 10 technology skills
  7. Fools and jokers coming to a network near you
  8. How do you manage IP addresses?
  9. CEO payday: How much tech chiefs made in '08
  10. Telstra will split for NBN
  11. Students learn through robot battles


Network World on Twitter: Get our tweets and stay plugged in to networking news


The Need for an Adaptive Threat Management Architecture - Live March 31.
Create a more secure and efficient network. Find out how in this Live Webcast, "The Need for an Adaptive Threat Management Architecture." Join us on Tuesday, March 31, 2009, at 1:00 p.m. ET/10:00 a.m. PT. Get real-world advice from Jon Oltsik, senior analyst at consulting firm Enterprise Strategy Group.
Register today for this Live Webcast.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: