Thursday, March 04, 2010

Cops nab Mariposa botnet; Microsoft airs ID manager

Microsoft cranks out new identity management software | Open source, proprietary - all software is insecure

Network World Security Alert

Forward this to a Friend >>>


Spanish police take down massive Mariposa botnet
Spanish authorities have arrested three men in an operation that has crushed a major botnet network of infected computers. Read More


WEBCAST: St. Bernard

Get the Instruments You Need to Become an IT Security Hero
This online demo shows how you can quickly bullet-proof your internet security with the new iPrism 6.4 web filter, and you'll be entered to win one of the hottest music video games! Learn more

WHITE PAPER: Qwest

Connecting to Better Customer Service
Less than a third of surveyed IT executives believe their companies are "highly effective" at adapting to changing customer needs and priorities. Businesses that build a robust voice and data network infrastructure can achieve a high level of responsiveness, and transform customer information and feedback into actionable results. Click here.

Microsoft cranks out new identity management software
Microsoft announced at the RSA Conference Tuesday that it has begun shipping Forefront Identity Manager 2010, server software for provisioning and de-provisioning user access and privileges for network and database resources. Read More

Open source, proprietary - all software is insecure
Guess what? All software is basically insecure, a new report finds — and, yes, that means open source isn't much better than proprietary.Each side in the battle between open source and proprietary software has plenty of ammunition in the argument as to whether they're safer against the evils of malware, bugs or other vulnerabilities. Probably anything I'd say here, anything I'd cite, would be soundly... Read More

RSA Day #1: A Whirlwind of Activity
I'm in San Francisco at the RSA Conference, 2010. Attendance is up over last year's recession version of the show and a more up-beat vibe all around. Of course, the smell of industry hype is also in the air in the form of cloud computing. RSA's Art Coviello (amongst others), crowed about how the cloud was the ultimately destiny of Internet computing. Cisco announced an "always-on" cloud computing... Read More

Spam plague in February and more to come: Symantec
Spam levels in Hong Kong reached 90.6 per cent and virus activity in China was the highest in the world in February, according to Symantec's latest MessageLabs Intelligence Report. Read More


WHITE PAPER: IBM NWW

Develop Effective user Management
With IBM, organizations can develop comprehensive solutions to help gain visibility into business continuity risks, achieve control over utilization of sensitive business assets and automate a variety of processes for managing access to critical assets and data. Read more

Medical identity theft strikes 5.8% of American adults
Identity thieves are not only interested in tapping financial resources, but also after your medical identification data and services. Read More

Obama administration partially lifts secrecy on classified cybersecurity project
President Barack Obama's administration has declassified portions of the highly secret multi-billion dollar Comprehensive National Cybersecurity Initiative (CNCI), which was launched by the Bush administration as part of an effort to defend American interests in cyberspace. Read More

Antidotes promised to cloud security woes
The legacy physical IT security strategies of the past are unsuitable for the growing cloud computing environment, according to security technology enterprise SafeNet Solutions. Read More

Narus develops a scary sleuth for social media
Narus is developing a new technology that sleuths through billions of pieces of data on social networks and Internet services and connects the dots. Read More


WHITE PAPER: Force10

Three Steps to Saving with Cloud Computing
Discover how cloud computing dynamically streamlines your infrastructure, delivering freely scalable application service levels; dramatic capital and operational cost savings; flexibility and agility without new hardware; and more. Read Now!

SafeNet looks to secure data in the cloud
Encryption vendor SafeNet is now offering technologies that help enterprises securely store and access information held in third-party data centers. Read More

Internet freedom and security
It's already been a busy year in Internet freedom and security, with Google getting hacked, Hillary Clinton speaking out, the FTC notifying companies about P2P threats and ZeuS Trojan attacks Read More

Antivirus software often foxed by malicious URLs
Many malicious URLs are now invisible to URL filters and antivirus software alike, a web security company has found after conducting its own tests. Read More

New exploit technique nullifies major Windows defense
The disclosure of a new exploit technique that bypasses an important Windows security feature may lead to more successful attacks against Microsoft's newer operating systems, researchers said today. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Forrester Research and Network World want to hear from you!
We are collaborating to conduct an on-line-based study focused around data center strategy. The survey should take approximately 12 to 15 minutes to complete. This is both a confidential and anonymous survey and your results will only be used in aggregate. As a special thankyou, all respondents will receive a free copy of the resulting research report from Forrester – a $500 value! Thank you for taking the time to fill out the survey.

Today from the Subnet communities

Massive giveaway from Cisco Subnet: 50 copies of the Cisco Press CCNP Cert Kits kits are up for grabs. Deadline March 31. 15 books on Microsoft PerformancePoint business analytics available, too.

SLIDESHOWS

7 most useful Firefox add-ons
Some "add-on apps" work well enough to replace a standalone desktop application. Here are seven add-ons that transform Firefox into a fully functioning application.

Fave raves: IT pros' favorite products
We asked readers about their favorite must-have network products and found there's a lot of love for products that can automate manual processes, improve visibility and management, and speed performance for end users. Products that save money are also, not surprisingly, big favorites.

MOST-READ STORIES

  1. Ten of the world's strangest social networks
  2. Wi-Fi finders let thieves track down hidden laptops
  3. 21 apps Apple doesn't want on your 3.0 iPhone
  4. 7 most useful Firefox add-ons
  5. Q&A: Verizon's LTE road map for 2010 and beyond
  6. All kinds of free stuff
  7. Microsoft: Don't press F1 key in Windows XP
  8. Why trust a hotel chain that's had three breaches in a year?
  9. The 10 all-time greatest free downloads and services
  10. Novell target of hedge fund's $2 billion takeover bid

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment