Search This Blog

Wednesday, March 10, 2010

Microsoft warns of new IE bug; attacks under way

Microsoft patches Excel, XP, Vista, W7, Virtual PC; leaves others holes alone | FBI: Alleged extortionist wanted to cyber-bomb insurance company

Network World Security Alert

Forward this to a Friend >>>


Microsoft warns of new IE bug; attacks under way
Microsoft today warned of a critical vulnerability in Internet Explorer that is already being exploited by hackers, the second such admission in the last two months. Read More


WHITE PAPER: Qwest

Connecting to Better Customer Service
Less than a third of surveyed IT executives believe their companies are "highly effective" at adapting to changing customer needs and priorities. Businesses that build a robust voice and data network infrastructure can achieve a high level of responsiveness, and transform customer information and feedback into actionable results. Click here.

WHITE PAPER: Websense

Websense Security Labs State of Internet Security 2H09
Do you know just how adept Web adversaries have become in using the Internet to spread malware in their attacks? Understand where the true threats lie with this report which summarizes the significant findings of Websense researchers using the ThreatSeeker™ Network during the six-month period ending December 2009. Learn More

Microsoft patches Excel, XP, Vista, W7, Virtual PC; leaves others holes alone
As part of Microsoft's regular Patch Tuesday schedule, the company released two patches that fix eight holds in Windows and Microsoft Office. Both holes have an overall rating of "important" but using another metric, its Exploitability Index, they have earned the highest rating of "1." This means that Microsoft Security believes that exploit code is not only likely, but that it can be created in... Read More

FBI: Alleged extortionist wanted to cyber-bomb insurance company
Threatening e-mails, false public statements and spam were all part of a California man's cyber-extortion plan against the New York Life insurance company, according to the FBI.  Read More

FTC: Identity thefts down, but fraud complaints up
Identity theft continues to lead the Federal Trade Commission's yearly look at consumer gripes but reports of the crime actually dropped  5% from 2008.  Read More


WHITE PAPER: Tripwire

FISMA Prescriptive Guide
Learn how Tripwire helps federal agencies, as well as the organizations and contractors that store, process or transmit federal information. The FISMA Prescriptive Guide contains case studies from three fictional federal agencies, each capturing the perspective of a key stakeholder in the FISMA compliance process. Click here.

Travelers file complaints over TSA body scanners
Documents obtained by the Electronic Privacy Information Center (EPIC) shows complaints have been lodged with the Transportation Security Administration (TSA) over the use of whole body scanners at U.S. airports. Read More

Opera confirms critical browser bug
Opera Software yesterday confirmed a critical vulnerability in its Windows desktop browser, and said it is working on a patch. Read More

Schneier: Fight for privacy or kiss it good-bye
If the public wants online privacy it had better fight now for laws to protect it because businesses won't and individuals don't have the clout, security expert Bruce Schneier told RSA Conference. Read More


E-GUIDE: Compuware

5 Tips for Getting the Best Web App Performance
This eBook, compiled by Network World, explores the pressing issues, from dealing with outages and evaluating performance monitoring services, to the impact of virtualization. Get expert tips to optimize your Web apps. Learn More Now

Online security questions are too easy to answer
Security questions that allow web users to access their online accounts if they forget their passwords, can easily be answered by hackers, says researchers at the University of Cambridge. Read More

Office updates patch Excel security flaw
Microsoft rolled out minor updates to the 2004 and 2008 editions of its Office suite of productivity tools on Tuesday that patch a security vulnerability in the Excel spreadsheet application. Read More

There's an Insecure App for That
The Apple iPhone "app for that" commercials have become so ingrained in pop culture that it's a running joke, a catch line among many folks. There is even a website that parodies the ad campaign. But, it's true, these days, whether you want to use Facebook and Twitter, bank online, or find the nearest Thai restaurant, you can find an application to help you get it done. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

The Future of Big Iron
Do your IT plans include mainframes? Participate in this Aberdeen survey and see how your plans stack up to those of peers in terms of on what core applications are staying on mainframes and where the industry is headed in operating and software architecture. The goal is to get an accurate picture of the opportunity for expanded utilization, the role of 3rd-party support, and overall objectives with respect to distributed, outsourced, heterogeneous and centralized computing paradigms. Aberdeen will also establish a baseline for performance and a set of best practices for improving the efficiency and utilization of mainframe computing technologies. All survey respondents will receive a free copy of the resulting research.

Today from the Subnet communities

Massive giveaway from Cisco Subnet: 50 copies of the Cisco Press CCNP Cert Kits kits are up for grabs. Deadline March 31. NEW! 15 books on Microsoft System Center Operations Manager (OpsMgr) 2007 R2 available, too.

SLIDESHOWS

21 apps Apple doesn't want on your 3.0 iPhone
The following 21 apps today run only on jailbroken iPhones. Some may even prove precursors to features released in future Apple iPhone firmware updates.

10 geeky items you're embarrassed to admit you want
Most of us love gadgets. But there is a certain eye-popping reaction when we find a gadget that speaks to our technological selves. Owning such devices would surely be the subject of teasing from those who deny their inner geek, but it would also be the cause of more than a little envy.

MOST-READ STORIES

  1. FDIC: Hackers took more than $120M in three months
  2. Former NSA tech chief: 'I don't trust the cloud'
  3. Tech debate: Google Gmail vs. hosted Microsoft Exchange
  4. The state of 4G in 2010
  5. Microsoft delivers feature-rich SSL VPN
  6. A must read for IT professionals, legislators and law enforcement
  7. Time flies dept.: Dot-com craze peaked 10 years ago
  8. LTE speeds faster than expected in Verizon trials
  9. Pa., district accused of student spying puts IT workers on leave
  10. U.S. softens Internet export rules for Iran, Sudan and Cuba

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: