Search This Blog

Thursday, August 20, 2009

Windows WINS attacks originating in China; SQL injection attacks led to massive data breaches

Windows WINS attacks originating in China; Managed security services all the rage
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile


Sponsored by RSA Security
rule

Choosing the right SIEM solution for cost savings
A quality SIEM solution can actually realize immense, real-time cost savings by improving efficiencies and reducing incident response times within your organization. To learn how companies have achieved savings upwards of 60-75% in man hours and response times, download your complimentary solution brief: "How RSA enVision® Delivers an Industry's Best ROI" today.

Click here to download.

rule

Spotlight Story
SQL injection attacks led to massive data breaches

The huge data thefts at Heartland Payment Systems and other retailers resulted from SQL injection attacks and could finally push retailers to deal with Web application security flaws. Read full story

Related News:

Windows WINS attacks originating in China
Attacks on the WINS service vulnerability in Windows Server are coming from China, but so far are not widespread, according to the Internet Storm Center.

Managed security services all the rage
It's an understatement to say that IT organizations face exceptionally challenging times. For many, budget cutbacks for 2009 were worse than predicted.

Massachusetts makes changes to ID theft regulations
State regulators in Massachusetts have made changes to a set of identity theft regulations.

Government informant is called kingpin of largest U.S. data breaches
Federal law enforcement officials say the third indictment of alleged hacker Albert Gonzalez in connection with major breaches of Heartland and Hannaford Brothers systems is a coup for the government.

Study: Flash Cookies Track Even Privacy-conscious Surfers
Flash cookies placed by many of the most popular Web sites are being used to track site visitors, even going so far as to re-create http tracking cookies after they're deleted by privacy-conscious surfers.

August Giveaways
Cisco Subnet is giving away training from Global Knowledge and 15 copies of Practical Intrusion Analysis; Microsoft Subnet is giving away training from Global Knowledge and 15 copies of SCCM 2007 Unleashed. Google Subnet is giving away 15 copies of Web Geek's Guide to Google Chrome. Entry forms can be found on the Cisco Subnet, Microsoft Subnet and Google Subnet home pages. Deadline for entries is August 31.

Network World on Twitter? You bet we are


10 sports technologies to love, 5 to hate
Sports technologiesMany technologies help fans enjoy sports. Others just annoy.

Apple disasters
Apple disastersApple has enjoyed huge success with the iPod and iPhone, but Apple has had a number of commercial flops, too.

IDC: Realizing the Benefits of Deduplication
Many organizations are grappling with rapidly growing storage requirements. IDC has found that those organizations are experiencing 50% growth in data, adding as much as 4TB of data each year. Read this whitepaper on dynamic deduplication to understand cost effective solutions to exploding storage.
Learn more.


HP Halo Telepresence Solutions
Learn about this virtual meeting tool that gives users a "tele-immersive" experience. It goes beyond phone and video conferencing to create a lifelike encounter so natural that many users report forgetting whether they met a colleague in person or over Halo. Read this study today!
Learn more

 

August 20, 2009

TOP STORIES | MOST DUGG STORIES

  1. How to build a 100,000-port Ethernet switch
  2. Windows 7 RC downloads end Thursday
  3. The 10 stupidest tech company blunders
  4. Apple disasters
  5. Account password reset procedures a joke
  6. Windows WINS attacks in the wild
  7. When Apple flops: The worst products of all time
  8. DNS 'blacklist' unveiled
  9. Port 666
  10. FAQ: How to get Windows 7 on the cheap

Dynamic Security in the Increasingly Virtualized Data Center Network
New application designs and new infrastructures based on virtual resources are generating new communication patterns in data center networks that can't be secured by conventional, perimeter-oriented designs. Join us for this live webcast on September 17, 2009 and discover a dynamic, scalable architecture for securing virtual services and much more.
Register today.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: