2008 was year of the SQL injection attack: IBM The year 2008 can be viewed as the year of the SQL injection attack, according to IBM's Internet Security Systems "X-Force 2008 Trend Statistics" report issued Monday. Group takes Conficker fight to a new level Forming a global alliance to fight cybercrime isn't easy, and building an organization that can stay one step ahead of cyber crooks in more than 100 countries is close to impossible. But a band of volunteers calling itself Conficker Working Group thinks it can do it. Do I own my machine? The built-in Webcam light is on. It shouldn't be on. I'm not using any recording, video-conferencing or photo applications. Why is it on? Is someone watching me? It's at times like this I get the eerie feeling that I don't actually, fully and completely own my machine. Turns out it was a driver problem, all fixed now. But I still can't shake that feeling. Conficker Worm: Has the Hype Been Worth It? Cisco Subnet welcomes new guest blogger, security expert Andrew Whitaker. Whitaker notes that the Conficker worm seems not to have been the big, bad threat that so scared the industry. Koobface worm to users: Be my Facebook friend A worm that hit Facebook last December has resurfaced, a security researcher said today, and is now hijacking user accounts -- not only for that social networking service, but also for MySpace, Friendster, LiveJournal and others. GhostNet highlights evolving threat environment The high-profile disclosure over the weekend of the GhostNet cyberespionage ring that targeted 1,295 computers in more than 100 countries underscores how highly targeted and sophisticated attacks, often run by criminals, are changing the security landscape, according to a security researcher at Symantec. Podcast: Avoiding the 5 Traps of eDiscovery Is your data retention and e-mail archiving system up to date with the latest rules and regulations concerning electronic discovery (eDiscovery)? Keith Shaw talks with Rick Dales of Proofpoint about some of the hidden pitfalls surrounding eDiscovery. Find out if you're ready before the lawyers come calling. (14:27) Intrusion prevention strategies for 11n There are several ways to scan your 802.11n air environment for nasty goings-on. At a glance, the options seem pretty straightforward. However, you need to look carefully under the hood to draw a true apples-to-apples comparison of the accuracy and cost of the various offerings. Deep computer-spying network touched 103 countries A 10-month cyberespionage investigation has found that 1,295 computers in 103 countries and belonging to international institutions have been spied on, with some circumstantial evidence suggesting China may be to blame. Prevent intrusions: What to look for In the Buying Tips section of our Product Guide, find 15 questions to ask about IPS before you buy one. April giveaways galore Cisco Subnet and Microsoft Subnet are giving away training courses from Global Knowledge, valued at $2,995 and $3,495, and have copies of three hot books up for grabs: CCVP CIPT2 Quick Reference by Anthony Sequeira, Microsoft Voice Unified Communications by Joe Schurman and Microsoft Office 2007 On Demand by Steve Johnson. Deadline for entries April 30. Network World on Twitter Get our tweets and stay plugged in to networking news. |
No comments:
Post a Comment