Search This Blog

Thursday, July 09, 2009

Newest IE bug could be next Conficker, says researcher

Microsoft may have known about critical IE bug for months; When private information and business concerns collide
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile


Sponsored by BigFix
rule

It Power Management Strategies that Save
Successful power management policies deployed at enterprise scale promise numerous benefits including: Power cost savings,Environmental dividends, Rebates, Integration opportunities, Download this whitepaper and discover the building blocks of a successful IT Power Management policy and how this policy can align with your business's green initiatives.

rule

Spotlight Story
Newest IE bug could be next Conficker, says researcher

The critical flaw that Microsoft confirmed on Monday -- but has yet to patch -- is a prime candidate for another Conficker-scale attack, a security researcher said. Read full story

Related News:

Microsoft may have known about critical IE bug for months
The vulnerability that sent Microsoft scrambling yesterday and is being used by hackers now to attack Internet Explorer (IE) users may have been reported 18 months ago or more.

When private information and business concerns collide
I often advise IT professionals of the need to step up to working with their companies as strategic advisors around technology-related issues. This means helping business folk understand the strategic and practical implications of new technologies — and recommending policies that make sense in light of what technology makes possible.

Dartmouth security researchers: PKI's not so hard
Dartmouth University researchers have received Department of Homeland Security funding to make public key infrastructure easier to use for those looking to secure and authenticate network transactions. Their PKI Resource Query Protocol (PRQR) is working its way through the IETF standards process.

IT security pros are wary of cloud services
The adoption of cloud computing services is likely to follow the same path as virtualization and to mirror the same security concerns.

Online attack hits US government Web sites
A botnet comprised of about 50,000 infected computers has been waging a war against U.S. government Web sites and causing headaches for businesses in the U.S. and South Korea.

Majority of vulnerabilities now being exploited
The number of exploits being written to target specific software vulnerabilities could be at all-time highs, new threat figures have suggested.

July Giveaways
Cisco Subnet is giving away 15 copies each of books on Enterprise Web 2.0 and Building a Greener Data Center; Microsoft Subnet is giving away training from New Horizons to one lucky reader and 15 copies of Microsoft SQL Server 2008 Reporting Services Unleashed. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages. Deadline for entries July 31.

Network World on Twitter? You bet we are


Rise and fall of Nortel
vSphereFor better or worse, Nortel as we know it is coming to an end. Here's how the telecom giant got to this point.

Summer of geeks
IT quizSpace camp! They Might Be Giants! Check out these and 9 other vacation options.

Global Media on Virtualization
In this whitepaper learn why Global Media Company has made a strategic decision to embrace a virtualization strategy and has made a significant investment in WAN acceleration for SharePoint, Microsoft's enterprise content management (ECM) and collaboration technology. See how Certeon's aCelera virtual appliance for WAN acceleration and optimization can save you 60% in capital and operations TCO over proprietary hardware solutions, while reducing your application response time to remote users by 95%.
Global Media on Virtualization


 

July 09, 2009

TOP STORIES | MOST DUGG STORIES

  1. The 10 dumbest mistakes network managers make
  2. Rackspace to issue $3.5 million in customer credits
  3. IPhone users harangue Apple over battery life
  4. The tech industry's most baffling buzzwords: A brief guide
  5. Six Windows 7 features admins will actually care about
  6. Internet's biggest issue? IPv6 transition, new ARIN CEO says
  7. Deathmatch: Palm Pre vs. iPhone
  8. Microsoft confirms attacks against IE6, IE7
  9. Apple to add micro projectors to upcoming iPhone, iPod Touch
  10. The sudden departure of Cisco data center marketing honcho

Defend Against the Top 10 Threats to SME Data Security.
For a no-nonsense perspective on the most common types of network and data compromises in small to medium sized businesses, read this white paper. It lists the ten most common vectors of data compromise, with practical techniques and defenses to counter them.
Click here to continue.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: