Search This Blog

Friday, March 12, 2010

ZeuS botnet code keeps getting better… for criminals

Network World Security Alert - Newsletter - networkworld.com
Pennsylvania fires CISO over RSA talk | Biometrics: What, Where and Why

Network World Security Alert

Forward this to a Friend >>>


ZeuS botnet code keeps getting better… for criminals
The latest version of ZeuS botnet toolkit includes a $10,000 module that can let attackers take complete control of a compromised PC. Read More


E-GUIDE: Compuware

5 Tips for Getting the Best Web App Performance
This eBook, compiled by Network World, explores the pressing issues, from dealing with outages and evaluating performance monitoring services, to the impact of virtualization. Get expert tips to optimize your Web apps. Learn More Now

WEBCAST: Actuate

Discover BIRT.
Understand how BIRT simplifies and speeds to market the development of rich information applications. In this presentation, a technical expert behind BIRT will demonstrate a customer-facing application in action with Flash, Ajax, and JavaScript interactivity. Click Here!

Pennsylvania fires CISO over RSA talk
Pennsylvania's chief information security officer, Robert Maley, has been fired, apparently for talking publicly at the RSA security conference last week about a recent incident involving the Commonwealths online driving exam scheduling system. Read More

Biometrics: What, Where and Why
Biometrics encompasses a variety of methods for ensuring identity based on physical or behavioral traits. Conventional identifying traits include fingerprints, face topology, iris structure, hand geometry, vein structure, voice, signature and keystroke recognition. Emerging technologies analyze characteristics such as gait, odor, and ear shape. Rather than being used in isolation, biometrics systems are increasingly becoming multimodal, an approach that serves both to increase security and overcome failure-to-enroll problems. Read More


WEBCAST: ShoreTel

A Lower Cost Approach to UC
Learn about a switch-based architecture that provides the industry's lowest total cost of ownership while exploiting the full power of IP. See why this system beats the market leaders and has over 1 million users like Big Brothers/Big Sisters who candidly discuss their selection process, goals and ultimate success in moving to UC. Learn More!

Is the International Space Station just a costly flying lab or irreplaceable resource?
While NASA budget-keepers focus on setting future priorities for the space agency, many in the world space  community is trying to turn attention to the benefits a mostly complete Read More

Tighter security coming for .org names
The Public Interest Registry will add an extra layer of security known as DNS Security Extensions (DNSSEC) to the .org domain in June -- a move that will protect millions of non-profit organizations and their donors from hacking attacks known as cache poisoning. Read More


WHITE PAPER: Force10

Three Steps to Saving with Cloud Computing
Discover how cloud computing dynamically streamlines your infrastructure, delivering freely scalable application service levels; dramatic capital and operational cost savings; flexibility and agility without new hardware; and more. Read Now!

IE zero-day exploit code goes public
An Israeli researcher has published exploit code for an Internet Explorer zero-day vulnerability that Microsoft had just disclosed on Tuesday. Read More

Celebrities caused 2009 Twitter crime wave
Criminals started targeting Twitter in earnest during a key period in early 2009, and security company Barracuda Labs has worked out why. During the same few weeks a key list of a-list celebrities joined the site. Read More

Online banking fraud losses rise to nearly £60 million
Online banking fraud losses increased by 14 percent to £59.7 million last year, according to the latest figures from The UK Cards Association. Read More

Security industry faces attacks it cannot stop
At the RSA Conference in San Francisco last week, security vendors pitched their next-generation of security products, promising to protect customers from security threats in the cloud and on mobile devices. But what went largely unsaid was that the industry has failed to protect paying customers from some of today's most pernicious threats. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

The Future of Big Iron
Do your IT plans include mainframes? Participate in this Aberdeen survey and see how your plans stack up to those of peers in terms of on what core applications are staying on mainframes and where the industry is headed in operating and software architecture. The goal is to get an accurate picture of the opportunity for expanded utilization, the role of 3rd-party support, and overall objectives with respect to distributed, outsourced, heterogeneous and centralized computing paradigms. Aberdeen will also establish a baseline for performance and a set of best practices for improving the efficiency and utilization of mainframe computing technologies. All survey respondents will receive a free copy of the resulting research.

Today from the Subnet communities

Massive giveaway from Cisco Subnet: 50 copies of the Cisco Press CCNP Cert Kits kits are up for grabs. Deadline March 31. NEW! 15 books on Microsoft System Center Operations Manager (OpsMgr) 2007 R2 available, too.

SLIDESHOWS

21 apps Apple doesn't want on your 3.0 iPhone
The following 21 apps today run only on jailbroken iPhones. Some may even prove precursors to features released in future Apple iPhone firmware updates.

10 geeky items you're embarrassed to admit you want
Most of us love gadgets. But there is a certain eye-popping reaction when we find a gadget that speaks to our technological selves. Owning such devices would surely be the subject of teasing from those who deny their inner geek, but it would also be the cause of more than a little envy.

MOST-READ STORIES

  1. Facebook pushing 'Suicide Machine' into an open-source afterlife
  2. Shutdown of Zeus botnet controller has researchers wondering
  3. Cisco, Microsoft certifications increase high-tech salaries
  4. Ex-Sun chief dishes dirt on Gates, Jobs
  5. Time flies dept.: Dot-com craze peaked 10 years ago
  6. Street Fighter IV for iPhone now available for $10
  7. After takedown, botnet-linked ISP Troyak resurfaces
  8. 10 geeky items you're embarrassed to admit you want
  9. Tech debate: Google Gmail vs. hosted Microsoft Exchange
  10. 10 iPhone wellness apps for comically lazy

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: