Search This Blog

Friday, February 19, 2010

FAQ: The Kneber botnet revealed

Who Owns the Cloud? | Proctor and Gamble Thrives with Borderless Networks

Network World Security Alert

Forward this to a Friend >>>


FAQ: The Kneber botnet revealed
Security vendor NetWitness recently tapped into the logs of a command-and-control server for a botnet it calls Kneber, which has infected at least 75,000 computers at 2,500 companies and government agencies worldwide. Read More


WEBCAST: Tripwire

A Holistic Approach to Compliance Makes Business Sense
IT management has tremendous incentive to figure out a new, more effective and comprehensive approach to meeting information security and compliance goals. This webcast will explore those pain points, the solutions, and the best practices organizations should consider to make strategic information security an enabler of business value. Learn More!

WHITE PAPER: Splunk

Make IT Data a Strategic Asset
This paper outlines the struggles organizations face managing silos of IT data and how, using Splunk, users are changing the way they do their jobs and elevating the role of IT in their organizations. Learn More!

Who Owns the Cloud?
There is plenty of marketing speak about the cloud, but when you hang around the offices of the CIO and IT operations, you will find plenty of finger pointing. Who owns what? How the concept of a cloud construct will be embraced? The conversations we have with technology leaders share these common steps: Develop a special purpose PMO as a strategic driver for the cloud Build a cloud team from... Read More

Proctor and Gamble Thrives with Borderless Networks
Borderless Networks help enable global collaboration at Proctor and Gamble (2:10 min) Read More

Microsoft confirms rootkit to blame for Windows crashes after patch is installed
Microsoft today confirmed what a security researcher had discovered about the patch that was said to be causing Windows to crash. Read More


WHITE PAPER: Radware

Accelerating Next-Generation Data Center Initiatives
In today's competitive business landscape, every business looks for solutions to enable key business drivers, such as increasing business productivity, agility, continuity, globalization, and regulatory compliance. Effective – not to mention – cost effective application delivery lies at the heart of this need. Learn More

City of Norfolk hit with code that takes out nearly 800 PCs
Malicious code that mysteriously found its way onto an internal virtual print server took out nearly 800 computers used by the city of Norfolk, Virginia, last week. Read More

Over 75,000 systems compromised in cyberattack
Security researchers have unearthed a massive botnet affecting at least 75,000 computers at 2,500 companies and government agencies worldwide. Read More

Web 2.0 is biggest security threat for businesses
Four in five IT professionals believe Web 2.0 based malware will pose a big security threat this year, says Webroot. Read More


WHITE PAPER: BeyondTrust

Building a Secure and Compliant Windows Desktop
While removing administrator rights from end users may be the Holy Grail of desktop security, doing so can have an impact on what end users need to do their jobs. Read this white paper to discover powerful strategies to effectively remove administrator rights and improve desktop security. Read Now

Symantec offers free Norton Safe Web Lite
Symantec has made free URL checking software available to web users. Read More

Moscow billboard porn hacker busted
When a Russian hacker last month broke into a giant video advertising billboard located in Moscow to run a pornographic film on it, it caused some chaos in city traffic. But Russian news sources Thursday report police in the southern city of Novorossiisk have arrested the suspected billboard hacker. Read More

How to effectively contract your network privacy
When you use the public cloud, is your data in the "public" space? According to the Department of Justice it is. In a number of cases, the Justice Department is asserting that data help by a third party, such as a cellular service provider or a hosting provider, can be demanded by government agents without a warrant. Read More

Firefox 3.5.8 Closes Security Holes
Mozilla yesterday released updates for its Firefox Web browser to shore up vulnerabilities in the 3.5.x and 3.0.x browser versions. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Forrester Research and Network World want to hear from you!
We are collaborating to conduct an on-line-based study focused around data center strategy. The survey should take approximately 12 to 15 minutes to complete. This is both a confidential and anonymous survey and your results will only be used in aggregate. As a special thankyou, all respondents will receive a free copy of the resulting research report from Forrester – a $500 value! Thank you for taking the time to fill out the survey.

Today from the Subnet communities

Massive giveaway from Cisco Subnet: 50 copies of the Cisco Press CCNP Cert Kits kits are up for grabs. Deadline March 31. 15 books on Microsoft PerformancePoint business analytics available, too.

SLIDESHOWS

Videogame your way through the Olympics
If you're bored with (or inspired by) NBC's coverage of the games, there's always your PC or video game system that lets you feel like you're competing in these events.

The technology behind the Vancouver Olympic Games
Bell Canada is claiming the Vancouver 2010 Olympic network as the first IP-based converged network at any Olympic or Paralympic Games. It will be built to provide seamless telephone, wireless, radio and Internet communications services for fans, media, athletes and officials from around the world.

MOST-READ STORIES

  1. Outlook bug creates monster e-mail files
  2. Active Directory: 10 years old and thinking cloud
  3. RIM fights back with freebie BlackBerry Enterprise Server
  4. Most Windows 7 PCs max out memory
  5. Cisco patches multiple holes in its security products
  6. Is there a best certification?
  7. Look who's a nerd: Barbie becomes computer engineer
  8. Is Cisco truly committed to security? Prove it!
  9. New browser tweaks Chrome security
  10. Visual tour: Windows Phone 7

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: