Wednesday, April 14, 2010

IE8 has blocked over 560 million malware sites: how many were legit?

An inside look at intellectual property theft | Understanding Firewall Requirements for System Center Operations Manager 2007 R2

Network World Security

Forward this to a Friend >>>


IE8 has blocked over 560 million malware sites: how many were legit?
Since its launch, Internet Explorer 8 has blocked access to over 560 million sites that it determined were serving malware, or about 3 million blocks per day, said Brandon LeBlanc in a blog post on Friday. However, it is unclear how many of those sites were legitimate, duped into serving malware laced ads, sent to them from their ad network. Read More


VIRTUAL EVENT: CIO, Computerworld, CSO, InfoWorld & Network World

Live Security Panel – April 28th
Join us on April 28th for a live virtual event that will provide candid, expert advice on top security challenges and issues – all from the comfort of your desktop. Get in on the discussion - from the unique challenges presented by cloud computing and virtualization to the mass adoption of social media. Attend and you may win a Kindle!

WHITE PAPER: Sophos

Best practices for implementing Windows 7
If you're planning to roll out Windows 7, now is the time to review your endpoint and data protection strategies to make sure that you're taking full advantage of the new security features as well as enhancing your overall security for enterprise deployments. Read Now.

An inside look at intellectual property theft
Measuring the exact cost of intellectual property theft is difficult, even for the government entities assigned to measure such activities.   Read More

Understanding Firewall Requirements for System Center Operations Manager 2007 R2
We're frequently asked what firewall ports need to be opened and what protocols are communicated between servers in a System Center Operations Manager envrionment.  This gets a little more detailed than many people might care to know about, however it's amazing how often we have to dig this up and forward to people when designing or rolling out OpsMgr, so here you go... Read More

Top 5 Security No Brainers for Businesses
Occasionally folks forget about covering the fundamentals of security and start off down a rabbit hole following some shiny new technology that turns out to be just a rat hole. With today's limited security budgets you need to be sure that you've adequately covered your highest risk areas before moving on to other things. The high-risk areas are, of course, not the same for everyone and will change... Read More


WHITE PAPER: NetApp

Top 5 Hyper-V Best Practices
Read this whitepaper to get advice on everything from making sure you configure enough network connections, especially in iSCSI, to specifying the specific initiator groups and the correct LUN type when provisioning the NetApp LUN for use with Hyper-V. Learn More!

Microsoft to patch unhackable Windows 7 bug later today
Microsoft will play it safe by patching a Windows 7 bug that it says can't be exploited. Read More

Texas court upholds border search of laptop
The U.S. District Court for the Southern District of Texas has become the latest federal court to uphold the right of U.S. customs agents to conduct warrantless searches of laptop computers at U.S. borders. Read More

Identity theft fears weigh on Americans
Most Americans remain afraid of identity theft, but their level of anxiety is increasing, according to a survey by Unisys. Read More


WHITE PAPER: Oracle

Oracle Accelerate - Not Just Smart But Timely
This video highlights the Oracle Accelerate program - a group of pre-configured, tested solutions that combine Oracle enterprise applications and rapid implementation tools with industry-specific bundles. The program reduces the time, complexity and cost of deploying Oracle and is implemented by highly trained partners. Learn More.

The Battle for Internet Freedom in Italy
On Sept. 8, 2006, someone posted a cell-phone video on Google Video showing four bullies punching and kicking an autistic boy in their school in Turin, Italy. Read More

How security professionals monitor their kids
Cell phones, texting, IM, email, Facebook, MySpace--kids are interconnected today in ways hardly imagined two decades ago. But these technology-based communication platforms also enable new forms of an age-old parenting strategy: monitoring your kids. Who are they talking to? What are they talking about? Are they going where they said they are going? Read More

Extreme Networks joins RSA security alliance
Extreme Networks recently joined the RSA security partnership programme that certifies which products or services can interoperate with RSA's network security solutions. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

The Future of Big Iron
Do your IT plans include mainframes? Participate in this Aberdeen survey and see how your plans stack up to those of peers in terms of on what core applications are staying on mainframes and where the industry is headed in operating and software architecture. The goal is to get an accurate picture of the opportunity for expanded utilization, the role of 3rd-party support, and overall objectives with respect to distributed, outsourced, heterogeneous and centralized computing paradigms. Aberdeen will also establish a baseline for performance and a set of best practices for improving the efficiency and utilization of mainframe computing technologies. All survey respondents will receive a free copy of the resulting research.

Today from the Subnet communities

15 copies of CompTIA A+ study kits (book, video, flash cards) are available from Cisco Subnet.Deadline April 30. 15 books on Microsoft Systems Center Enterprise suite are available, too.

SLIDESHOWS

5 things we love/hate about Novell's SUSE Studio
Users might have a love/hate relationship with Novell's SUSE Studio. Here are five things we love and five things we disliked about the product.

CEO payday: What tech's top execs made in '09
The recession took its toll on tech CEOs' compensation in 2009, but not everyone lost.

MOST-READ STORIES

  1. Google Docs update puts more pressure on Microsoft Office
  2. Salesforce.com, VMware set to launch 'VMForce'
  3. Twitter to start pushing advertising to users
  4. Malicious Facebook ad redirected to fake antivirus software
  5. Intel to produce new Sandy Bridge chips by year-end
  6. Java founder James Gosling leaves Oracle
  7. SNIA standard should help in moving cloud data
  8. Hacker conference to address emerging Web threats
  9. Ex-Sun chief dishes dirt on Gates, Jobs
  10. Intel to ship samples of experimental 48-core processor

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment