Search This Blog

Monday, April 19, 2010

China reports millions of Conficker worm infections

New cloud service offers antivirus alternative | Patch Tuesday brings bevy of critical updates

Network World Security

Forward this to a Friend >>>


China reports millions of Conficker worm infections
China last year hosted more than one in four of the world's computers infected with a major variant of the Conficker worm, according to an official report, highlighting the wide reach of malware inside the country. Read More


WEBCAST: Webroot

Anatomy of a Complete Security Solution
Today's malware threats use any number of guises - viruses, phishing scams, network propagation, USB infection - but their motive is usually the same. Steal sensitive information. Attend this webinar to find out how to protect your organization against today's complex malware threats. Register now!

WHITE PAPER: ArcSight

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center

New cloud service offers antivirus alternative
Security vendor Panda Software has announced a full cloud web security service which it claims frees smaller companies from the need to filter for malware using complicated gateway boxes. New cloud security service filters web traffic Read More

Patch Tuesday brings bevy of critical updates
Microsoft today released its Security Advisory for April, which includes 11 updates to address 25 vulnerabilities. Impacting popular Microsoft products such as Windows, Microsoft Office and Microsoft Exchange, the software maker deemed five updates critical, another five are considered important and one was ranked moderate.Microsoft slates 25-patch Windows update for next week Read More

iPhone "Don't Text Me" app stops distracting, annoying text messages
Tired of your annoying friends texting you, especially while you're driving? Well, there's now a free iPhone application for that. "DON'T TEXT ME" was released today by Dr. Read More


VIRTUAL EVENT: CIO, Computerworld, CSO, InfoWorld & Network World

Live Security Panel – April 28th
Join us on April 28th for a live virtual event that will provide candid, expert advice on top security challenges and issues – all from the comfort of your desktop. Get in on the discussion - from the unique challenges presented by cloud computing and virtualization to the mass adoption of social media. Attend and you may win a Kindle!

New cyber crime intelligence service launched
A new service to identify enterprise vulnerabilities to cyber-crime attacks is being launched by RSA, the security division of EMC. Read More

New malware can take control of Macs, Intego warns
Batten down the hatches! Better yet, unplug your Mac and run for the hills! Intego, purveyor of internet security and privacy software for the Mac, reports that a new variant of malware--the intimidatingly-named HellRTS--has been spotted in the vast untamed reaches of the Internet. Read More

New 'name to shame' extortion scam targets porn users
A Japanese cyber extortion gang is running a new "name to shame" scam by duping users who pirate adult games into installing malware, then demanding they pay up to keep their names from being publicly posted online, a researcher said today. Read More


WHITE PAPER: Microsoft

Extended Security Features of Windows 7
Microsoft has added significant security enhancement to Windows 7. This Gartner research note details the capabilities available (many are only available to EA/SA subscribers), which features should be activated and where some security holes still remain. Read More.

BitTorrent bypass code could make downloads anonymous
The C# code that is said to evade ISP's prying eyes could cause more problems. Read More

Verifying identity in customer-not-present situations
How can a Web-based business verify the identity of a person with whom it has no prior relationship? This simple SaaS solution from IDology challenges a person to answer personal questions whose answers are unlikely to be known by others. The result is a high level of confidence that the person using the Web application is precisely who he says he is. Read More

Controlling RFID tags to protect privacy
A researcher is working on technology he hopes will be able to control RFID tags and protect private information. Read More

Data Protection Manager 2010 Design, Planning, and Implementation Best Practices
The following are best practices in designing and planning your DPM 2010 rollout:► Do not install DPM on domain controllers, Exchange servers, or Operations Manager Management or Gateway servers.► For most enterprise deployments, the recommended protection method is to use disk-to-disk-to-tape (D2D2T) or disk-to-disk-to-cloud (D2D2C).► DPM can be deployed onto a virtual machine. However, when... Read More

Operations Manager 2007 R2 Operations and Security Reporting Best Practices
The following are best practices when configuring operations and security report in OpsMgr 2007 R2:► Use scheduled reports to automatically distribute operational reports to administrators, application owners, managers, and executives.► Use the scheduled Windows file share distribution to post reports to directories that link to web pages. Use the Overwrite option to have the web pages update... Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

15 copies of CompTIA A+ study kits (book, video, flash cards) are available from Cisco Subnet.Deadline April 30. 15 books on Microsoft Systems Center Enterprise suite are available, too.

SLIDESHOWS

10 useful Google Chrome Experiments
Google's Chrome Experiments is a Web site that showcases JavaScript programs which deliver a rich user-graphics experience. To date, there are about 80 projects featured on Chrome Experiments. Here are the 10 most useful.

Interop history quiz
The venerable networking tradeshow Interop convenes this month in Las Vegas. Answer the following 10 questions about Interop, keep score and see how you stack up at the end.

MOST-READ STORIES

  1. 5 hot IT certification picks for 2010
  2. Zombies are open source; humans are proprietary
  3. Apache project server hacked, passwords compromised
  4. Israel bans iPads from America
  5. Windows Phone 7 vs. iPhone: a developer's perspective
  6. Why not iSCSI?
  7. Why hasn't Linux been more successful on the desktop?
  8. 10 things the Internet has ruined and five things it hasn't
  9. 12 "White Hat" hackers you should know
  10. Mystery solved: Why time stands still at 9:42 on iPhone

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: