Twitter wrestles with fourth worm attack Another worm attack early Monday on Twitter kept the micro-blogging Web service chasing down infected accounts and deleting rogue tweets. Weekend worms strike Twitter, teen admits responsibility Twitter was hit with at least three different worm attacks that started Saturday and continued into Sunday, the micro-blogging service acknowledged as it promised users it would review its coding practices. 1 in 5 Windows PCs still hackable by Conficker Although the media blitz about the Conficker worm prompted a significant number of enterprise users to finally fix a six-month-old Windows bug, about 1 in 5 business computers still lack the patch, a security company said Monday. Botlab keeping an eye on spamming botnets University of Washington researchers have developed a prototype system called Botlab that monitors botnets to gain insight into a major generator of spam. Does Social Networking Require User Policy Changes? IT security administrators have had a fairly easy case to make against such social networking sites as Myspace in the past. Myspace in particular tends to be a place for the mostly personal, and some profiles are simply front companies for online mobsters and malware pushers. PCI security rules may require reinforcements The PCI standard, long touted as one of the private sector's strongest attempts to regulate itself on IT security, is increasingly being slammed by critics who claim that the rules aren't doing enough to protect credit and debit card data. Can the status quo threaten your LAN? In times of economic crisis people tend to seek the safety and security of the status quo. "Doing what you've always done, and what everyone else is doing, is the most prudent course," goes the thinking. Security Tops IT Budget Priorities Security is on the minds of American companies and many are still making room in their budgets to invest in IT security initiatives, according to a survey released Monday by Robert Half Technology. Trend Micro dishes out security smorgasbord Trend Micro Monday dished out a smorgasbord of endpoint security products that put the focus on Trend's cloud-based architecture and its partnership with systems-management vendor BigFix. RSA upgrades data leak prevention suite EMC's RSA division Monday announced an upgraded version of its data-leak prevention suite, adding over twenty policy templates for recognizing personal identifiable information in countries around the world, including Spain and New Zealand. Podcast: Prepping for Tougher Health Data Rules As part of the recent stimulus bill, the HITECH Act will create standard electronic health records for every American by 2014, as well as introduce strict new rules for the protection of these health records. John Linkous from eIQnetworks discusses the components of the act and how IT can start preparing now for the new standards. (10:12) User education key to IT security: Microsoft With the release of its latest Security Intelligence Report, Microsoft is encouraging its partners and customers to become more security aware and educated, as new attack tactics are on the rise. Top Trends: Patch Management Find out how patch-management products work, and what they can do for you, in this Product Guide. April giveaways galore Cisco Subnet and Microsoft Subnet are giving away training courses from Global Knowledge, valued at $2,995 and $3,495, and have copies of three hot books up for grabs: CCVP CIPT2 Quick Reference by Anthony Sequeira, Microsoft Voice Unified Communications by Joe Schurman and Microsoft Office 2007 On Demand by Steve Johnson. Deadline for entries April 30. Network World on Twitter Get our tweets and stay plugged in to networking news. |
No comments:
Post a Comment