Search This Blog

Thursday, November 12, 2009

IA job prospects bright

Microsoft plugs 15 holes, including critical drive-by bug; iPhone security problems bring new risks
Network World logo

Security Strategies Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by Talari Networks
rule

Reduce Your Private WAN Bill 40-90% With Adaptive Private Networking
Steven Taylor moderates a discussion on a breakthrough new technology that offers the best of all worlds. Discover Adaptive Private Networking from Talari Networks. Learn how APN enables you to: Deliver more bandwidth per dollar than MPLS services at the same time providing greater reliability and application predictability.

Register Today!

rule

Spotlight Story
IA job prospects bright

No one reading this column needs general references to news about the economic difficulties we are living through in the United States and elsewhere. Just the other day, I spoke with a long-time friend and colleagues from the information security field who used to earn a decent living as a much sought-after consultant; last week he canceled his business telephone line to save money. He's looking for a permanent job. Read full story

Related News:

Microsoft plugs 15 holes, including critical drive-by bug
Microsoft today patched 15 vulnerabilities in Windows, Windows Server, Excel and Word, including one that will probably be exploited quickly by hackers. None affect Windows 7, the company's newest operating system.

iPhone security problems bring new risks
In just four days, not one but two worms targeting the iPhone have emerged. Both of the worms target the same vulnerability, a default password in the SSH server that is installed on jail-broken iPhones. While one worm is a mostly a nuisance, the second siphons personal information from the iPhone, which makes it a serious identity theft threat.

Windows 7 may be secure, but are Windows users safe?
Windows 7 users got a nice surprise on Tuesday when Microsoft released its first set of security patches since unveiling the new operating system last month. Of the 15 bugs patched, none affected Windows 7.

Federal Data Security Law: 'Careful What You Wish For'
A cybersecurity bill advanced further up the U.S. Senate gauntlet last week, and some IT security practitioners aren't happy about it.

Data-stealing hack targets jailbroken iPhones
Once more into the breach, my iPhone-wielding compatriots. On Monday, we heard about the iPhone vulnerability that allowed dastardly hackers to place nefarious Rick Astley wallpaper on some jailbroken devices. Now, security firm Intego reports that the same loophole can allow hackers to do far worse.

How a Botnet Gets Its Name
There is a new kid in town in the world of botnets - isn't there always? A heavyweight spamming botnet known as Festi has only been tracked by researchers with Message Labs Intelligence since August, but is already responsible for approximately 5 percent of all global spam (around 2.5 billion spam emails per day), according to Paul Wood, senior analyst with Messagelabs, which keeps tabs on spam and botnet activity.

November giveaways
Cisco Subnet is giving away free books on VMware vSphere security. Microsoft Subnet is giving away training from New Horizons and free books on Exchange Server 2010. Google Subnet is giving away free books on Android app development. Entry forms can be found on the main contest page. Trivia answers are revealed on each main Subnet page.

Network World on Twitter? You bet we are


Ethernet everywhere!
Ethernet everywhereInside planes, trains, cars and spaceships, Ethernet is a morph master. Here's a look at some of Ethernet's cooler implementations.

7 tools to ease Windows 7 rollout
Windows 7These utilities help you plan, ensure app compatibility and manage images.

Closing the Risk Gap in Privileged Access Control
In this whitepaper, Enterprise Management Associates (EMA) examines this critical issue in IT security administration in light of the BeyondTrust approach to helping businesses move from a trust-based system to a secure, auditable process in order to provide a higher standard of control and better support for regulatory compliance.
Click here to read more!


Five Steps to Determine When to Virtualize Your Servers
Server virtualization isn't just for big companies. Entry-level virtualization tools are low cost, and there are many benefits to virtualization. It's not a question of "if" you should virtualize your servers - but "when." This white paper outlines five solution-agnostic steps to help you determine when to virtualize your servers.
Learn more now.

 

November 12, 2009

MOST-READ STORIES

  1. Security pros seek hacking, forensics skills
  2. Priceless! The 25 funniest vintage tech ads
  3. Online users becoming less anxious over security, privacy
  4. Windows exploit code coming
  5. Apple delivers mammoth update; patches 58 bugs
  6. Ahead of their time: Nine technologies that came early
  7. Patch Tuesday: What the experts say
  8. Cisco warns UC users of limited support for Windows 7
  9. Digg's MrBabyMan racks up 4,000th front-page submission
  10. Firefox, five years out of Phoenix's ashes, aims at mobile, video, offline

When Pressing the Send Button Results In Compliance Violations
Protecting confidential data is serious business. Failure may result in fat fines and even jail time - not to mention damage to your brand. WatchGuard's easy-to-use, all-inclusive email and web secure content and threat prevention appliances offer a complete data protection solution.
Click here.



EMO Labs: Better Sound Through Innovation at DEMOfall 09

EMO Labs' Invisible Speaker innovation takes People's Choice Award top honors at DEMO conference.
Watch EMO Labs product launch.


 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments: