Search This Blog

Wednesday, June 03, 2009

40,000-plus Web sites infected in 'Beladen' Web attacks

Apple patches 10 critical QuickTime bugs; Dump the File Cabinet and Scan Your Important Papers
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile


Sponsored by BigFix
rule

Optimizing IT Budgets
Discover how to help IT managers work within budget constraints by offering: Fast implementation, High Return on Investment (ROI), Low Total Cost of Ownership (TCO).

rule

Spotlight Story
40,000-plus Web sites infected in 'Beladen' Web attacks

More than 40,000 Web sites were compromised over the weekend via SQL-injection attacks with malware that attempts to push visitors to a site dishing out malicious software, according to a security firm. Read full story

Related News:

Hackers tweet, infect Twitter users with scareware
The latest attack to hit Twitter is a "security nightmare" and marks the first time hackers have taken to using the micro-blogging site for profit, a researcher said today.

Apple patches 10 critical QuickTime bugs
Apple on Monday patched 10 critical vulnerabilities in QuickTime, including one that was hinted at in a Mac hacking book three months ago.

Dump the File Cabinet and Scan Your Important Papers
Sue Bulot wants advice about digitizing all of her important papers.

June Giveaways

Cisco Subnet and Microsoft Subnet are giving away training from Global Knowledge to two lucky readers and 15 copies each of books on IPv6 security, the Cisco Secure Firewall Services Module, and Active Directory Domain Services 2008. Deadline for entries June 30.


Evolution of Ethernet
Evolution of EthernetFrom 3Mbps over shared coax to 40/100Gbps over fiber…and beyond.

Apple iPhoneys: The 4G edition
Apple iPhoneys: The 4G editioniPhone enthusiasts from around the Web offer their visions for the next-gen iPhone.

ESG: Why DR is Getting Harder
According to data from the Enterprise Strategy Group (ESG), companies that have adopted WAN optimization technologies have realized significant DR benefits. If you have delayed implementing a DR solution because of high network costs and the ability to achieve desired RPOs, WAN optimization should be considered. Learn ESG's perspective on the best way to implement a DR strategy.
Learn more.


 

June 03, 2009

TOP STORIES | MOST DUGG STORIES

  1. Nine management apps that won't bust your budget
  2. The rise of personal 'Mi-Fi' hotspots
  3. Windows 7 alluring, but XP is the migration factor
  4. YouTube hit by porn storm
  5. 20 years after Tiananmen, China containing dissent online
  6. Ubuntu Desktop: Plenty of sizzle, not much steak
  7. Microsoft warns of DirectX attack on XP, WS2003 in the wild
  8. Bing: A visual tour of what's new
  9. Obama announces new cybersecurity direction
  10. Top four tips to fight off botnet denial-of-service attack

Holistic Approach to Business Security
Take a business-level view of security and risk management, so you can prioritize security activities and focus on those that make the most strategic sense. With this white paper, learn to direct resources to mitigate risk and costs, and see how IBM enterprise security can optimize business results.
Learn More



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: