Monday, September 13, 2010

'Here you Have' Virus Deletes Security Software on Windows

'Here you have' e-mail virus a blast from the past | 17% of web users have been 'ripped off' online

Network World Security

Forward this to a Friend >>>


'Here you Have' Virus Deletes Security Software on Windows
On Thursday, a new worm hit the Internet, and it's been spreading by emailing the address books of infected users, according to McAfee Labs. By masquerading as a benign PDF, the worm looks something like this when it shows up in your inbox: Read More


WHITE PAPER: Cisco

Security in the Cloud
This technology dossier contains four papers that address security considerations in cloud computing. It includes IDG Research results on what IT managers have to say about cloud security, executive viewpoints on blending cloud solutions to optimize security, and a strategy paper that addresses protecting data. Read now!

WHITE PAPER: Symantec

Information Protection Survey Small Mid Business
The SMB Information Protection survey sheds light on the risks SMBs are facing, what they are doing about it and how much it is costing them. Read this report to learn the simple steps SMBs can take to improve their information protection footing. Read Now.

'Here you have' e-mail virus a blast from the past
If you haven't seen the headlines by now you may have received the type of e-mail from your IT department that just hit my inbox:  "I wanted to warn you that there are recent reports of a virus that has been increasingly prevalent.  This virus spreads through e-mail with the phrase 'Here you have' in the subject line.  If you receive this email, please do not open it. Delete it." Read More

17% of web users have been 'ripped off' online
Nearly one in five (17 percent) web users admitted they have been 'ripped off' online, says 192.com. Read More

IBM: An Encryption Key Management Leader
While many folks were sunning themselves at the beach this past summer, IBM introduced some pretty important security technology, the Tivoli Key Lifecycle Manager (TKLS). Basically, the TKLS products are designed to create, manage, secure, and store encryption keys as a service. Read More


WHITE PAPER: SonicWALL

The Next Generation is the Smart Generation
Innovations such as mobility, Web 2.0, social media and cloud computing have dramatically changed the IT landscape and introduced new security threats into the corporate network. This eBook investigates why traditional firewalls are no longer enough, and how application intelligence and control enable network security in the wake of these changes. Read more.

Spaceflight formation flying test bed takes off
Getting complicated systems onboard a single spacecraft  to operate as one integrated unit can be hard enough but some space agencies are trying to address the challenges of  getting multiple spacecraft to fly in formation and operate Read More

Cisco Announces Wireless Vulnerabilities
Just when I decided to dedicate more time to blogging about Cisco Wireless and other Cisco related areas but didn't have anything to blog about Cisco has brought me the answer. The answer to my blogging dilemma lies in Document ID: 112062. This document is a Cisco Security Advisory that details seven different vulnerabilities that are said to be independant of each other. The vulnerabilities include:... Read More

Attacks on power systems: Data leakage, espionage, insider threats, sabotage
Data leakage is one of the intractable problems of information assurance because of the possibility of covert channels for extraction and exploitation of unrecognized copies of confidential data. Read More


WHITE PAPER: Watchguard

10 questions to ask before you buy an anti‐spam solution
With so many anti-spam products on the market, how can you be sure you're getting the best solution for your business network? With these ten critical questions as your guide, you can cut through the marketing hype and zero in on the key features and benefits that should guide your decision. Read now!

Moving day: How to protect your company during a relocation
In its 16 years of business, DataServ Solutions has relocated five times. That makes David Berndt, CIO at the document-digitization and process-automation company in St. Louis, Mo., something of an expert on the topic of securing corporate moves. "By now, we've got a good process," he says. In the most recent move this past February, nothing was lost or damaged. "We shut down the office at about 2:30 on Friday, and we were up 100 percent on Monday, with no disruption for our clients and no service levels missed." Read More

Cyber-Warfare: U.S. Military Hackers and Spies Prepare to Knock the World Offline
Theoretically, the world is engaged in a hidden global war that is being fought on a dark virtual battlefield. On October 1st, in the cyber domain, 1,000 U.S. military hackers and Internet spies will get down to the business of cyberwar. Read More

Online privacy bills would hurt e-commerce, trade group says
Proposals in the U.S. Congress that would create new rules for websites collecting personal data would cripple the online advertising and publishing industries, e-commerce trade group NetChoice said Thursday. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

SLIDESHOWS

6 useful Wi-Fi tools for Windows
Free or cheap apps can help troubleshoot your wireless network, turn your laptop into a hot spot, and more.

IT personality types: 8 profiles in geekdom
Consider this your field guide to the flora and fauna of your work life: the eight classic personality types you'll find in virtually any reasonably sized IT department.

MOST-READ STORIES

  1. Rackspace pulls plug on Koran-burning church's Web site
  2. Cisco wireless controllers open to attack
  3. 'Here you have' e-mail worm spreads quickly
  4. Epic failures: 11 infamous software bugs
  5. IT personality types: 8 profiles in geekdom
  6. Microsoft plans double-sized Patch Tuesday next week
  7. The 22 best Android apps
  8. 10 businesses you can start from your smartphone
  9. U.K. government could drop Microsoft for Linux
  10. Linux desktop market share: Small no matter how you measure

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment