Search This Blog

Monday, May 11, 2009

Security Wisdom Watch: Who Gets Thumbs Up (and Down)?; 160,000 student, alumni accounts breached

Microsoft patches huge Windows 7 RC bug; Microsoft lays off Steve Riley, the former face of Microsoft Security
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by EMC
rule

EMC's CSO Explains the Triple A's of Security Mgmt.
Roland Cloutier, EMC's Chief Security Officer shares his secrets for managing Authentication, Audit, Availability and security of the IT network infrastructure. Join us on Wednesday, June 3 at 2:00 p.m. ET/11:00 a.m. PT to find out how. Register for this Live Webcast now.

rule

Spotlight Story
Security Wisdom Watch: Who Gets Thumbs Up (and Down)?

By Bill Brenner
Much has happened in security circles this past month, from all the hoopla over Conficker to the ongoing economic bloodshed in the industry. Here are a few that stood out -- for better or worse. Read full story

Related News:

Editor's note: We will be changing how we send out Network World newsletters over the next few weeks. To ensure future delivery of your newsletters, please add nww_newsletters@newsletters.networkworld.com to your e-mail address book or 66.186.127.216 to your white-list file. Thank you.

UC Berkeley says hacker broke into health-services databases The University of California at Berkeley Friday disclosed that hackers broke into restricted computer databases in the campus health-services center, as the university began notifying current and former Berkeley students their personal information may have been taken.

Microsoft patches huge Windows 7 RC bug Just days after it launched Windows 7 Release Candidate (RC), Microsoft has released a fix for a major flaw that slipped through testing.

Microsoft lays off Steve Riley, the former face of Microsoft Security Microsoft Subnet found Twitter abuzz with the news that Steve Riley was dismissed as part of Microsoft's layoffs this week.

Cyberbullying? No, it's just bullying. Gibbs discusses proposed legislation concerning "cyber-bullying" and points out that the laws would be a really, really bad idea and that that conflating "cyber" with almost anything is simply bogus. Dude.

Offshore Contract Tactics to Protect Against Threats In the wake of events such as the admission of fraud by Satyam's CEO and recent terrorist attacks, sourcing professionals have been forced to consider whether they really enjoy the protections they thought they had already established contractually with their providers.

How to secure your home network Reader Steve Hawley is all too typical. His home network houses a mix of Macs and Windows PCs, an old 802.11b Linksys router connected to a cable modem, and a couple of Airport Expresses connected to sound systems around the house. He wrote to us, seeking some advice on how to configure that network so he could:

Bill would turn Internet flamers into felons A little-noticed bill re-introduced in Congress last month would make the use of popular electronic communications a felony if “the intent is to coerce, intimidate, harass...

MIT recognizes startup Ksplice for rebootless OS updates Ksplice, a Cambridge, Mass., startup whose software is designed to help computer users keep their operating systems secure and updated without the hassle of frequent...

May Giveaways
Cisco Subnet
, Microsoft Subnet and Google Subnet are collectively giving away books on Google Apps Deciphered, the CCNA Security exam, an awesome SQL Server 2005/2008 training video and the grand prize, a Microsoft training course from New Horizons worth up to $2,500. Deadline for entries May 31.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Evolution of Ethernet
Evolution of Ethernet From 3Mbps over shared coax to 40/100Gbps over fiber…and beyond.

Apple iPhoneys: The 4G edition
Apple iPhoneys: The 4G editioniPhone enthusiasts from around the Web offer their visions for the next-gen iPhone.

Sponsored by EMC
rule

EMC's CSO Explains the Triple A's of Security Mgmt.
Roland Cloutier, EMC's Chief Security Officer shares his secrets for managing Authentication, Audit, Availability and security of the IT network infrastructure. Join us on Wednesday, June 3 at 2:00 p.m. ET/11:00 a.m. PT to find out how. Register for this Live Webcast now.

rule

EMA: Refining privilege access security.
Close the security gaps in high-privilege access control and authentication by selecting the right security products for the job. This whitepaper, "Resolving the Privilege Management Paradox," details how. EMA outlines how to find products that offer strong shared access management, better control and clear visibility and multifactor authentication.
Click to download.


DNS news and tips
DNS is not secure and is extremely vulnerable. DNS is at the core of every connection we make on the Internet. While some servers are indeed vulnerable, because of inadequate management or knowledge, the real threat is from the protocol itself and how data is easily subverted or faked as it moves around the internet.
Receive the latest DNS news and tips

 

05/11/09

Today's most-read stories:

  1. The Internet sky really is falling
  2. Death of the mouse
  3. 10 tech-inspired Mother's Day gifts
  4. As economy softens, Microsoft ramps up research
  5. FutureNet 2009: IPv6 coming, ready or not
  6. Despite pledge, researchers release VBootkit 2.0 code
  7. Multi-gigabit wireless spec on tap by year-end
  8. Top 7 reasons people quit Linux
  9. Obama tax plan bad for Cisco, other offshorers
  10. Study: U.S. air traffic control vulnerable to cyberattack
  11. Notebook replaces trackpad with LCD panel


Network World on Twitter: Get our tweets and stay plugged in to networking news


Metzler: 2009 Handbook of Application Delivery
Successful IT organizations must know how to make the right application delivery decisions in these tough economic times. This handbook authored by WAN expert Jim Metzler will help guide you.
Download now



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: