Search This Blog

Thursday, October 14, 2010

Microsoft will look to courts for botnet takedowns

Focus on ZeuS Malware Clears the Way for Other Threats | Pssst....Wanna buy some cool laser technology?

Network World Security

Forward this to a Friend >>>


Microsoft will look to courts for botnet takedowns
Microsoft has seen a dramatic drop in the number of computers infected with Waledac, a piece of malicious software affiliated with a botnet that was once responsible for a massive amount of spam. Read More


WHITE PAPER: NetApp

Effectively Address your Biggest IT Challenges
Meet your CAPEX and OPEX cost saving goals with a more efficient data storage strategy. Enterprise Strategy Group lays the groundwork on how to do just that in this whitepaper. Ensure you have the tools in place to keep costs down while better managing data growth. Read More!

WHITE PAPER: ForeScout

Choosing a Network Access Control System
This paper describes different types of network access control (NAC) systems and provides guidance as to which type would be best suited for your network. Learn More.

Focus on ZeuS Malware Clears the Way for Other Threats
The ZeuS "crimeware toolkit" has made recent headlines lately by garnering attention of the FBI, and for the new components that allow hackers to break into BlackBerry and Symbian phones. Read More

Pssst....Wanna buy some cool laser technology?
DOE's Lawrence Livermore National Laboratory looking for laser partnersThe US Department of Energy's Lawrence Livermore National Laboratory wants partners who may want to license and commercialize its powerful fiber laser technology. Read More

UK infrastructure at risk of cyberattack
The UK's major infrastructure, including power grids and emergency services, could be the target of a cyber-attack, warned the Government Communication Headquarters (GCHQ). Read More


WHITE PAPER: Tripwire

Scrambling at Audit Time?
Does your organization treat compliance as a set of check boxes designed to meet the auditors' requirements? If so, you are wasting a lot of time, money and precious IT resources. This white paper is a roadmap for making compliance a painless, efficient, and routine part of your IT processes. Read now!

Cisco's top 10 rivals
Competition is only getting tougher for Cisco as it continues to expand in 30 or so new markets while attempting to maintain growth in its core routing and switching businesses. Read More

Facebook Tightens Security with One-Time Passwords
By its very nature as a social network, Facebook is a veritable gold mine for cyber criminals. Recognizing the threat of account hijacking and compromise, Facebook has implemented new security features to protect Facebook accounts, including a one-time password via mobile phone text message. Read More

Security chief warns of global cyberthreat
Once hailed as an economic saviour, the Internet is now in danger of becoming a threat to the future prosperity of the UK and its allies, the head of UK security agency GCHQ Iain Lobban has said in a rare speech. Read More


WEBCAST: Bradford Networks

Step-by-Step Process to Network Security
Hear from one financial services IT pro who thought his network was completely secure until it failed an internal security audit. Tim Childress from the credit card division of Bridgestone discusses the unique approach he took to improve network security. Hear how he met his objectives to stop rogue devices, gain better network visibility. View now

Many businesses not PCI compliant at time of data breaches
Companies can dramatically cut their risks of data breaches by complying with payment standards, according to a new report. Read More

Repairing Mail passwords
Reader Ron Sharp faces a forgetful Mail. He writes: Read More

Think Your Twitter DM Is Private? Think Again
Twitter has established itself as a means of broadcasting information to wide group of people all at once. But, for those times where you want to talk more intimately, Twitter also has the ability to send a Direct Message (DM) that is private between the two parties. Well, it's supposed to be private, but the reality is perhaps not as secretive as one might expect. Read More

Surprise! Passwords Still A Weak Link in Security Chain
Despite predictions that the password will fade into obscurity, or the rise of alternative methods of authentication such as fingerprint scanners, the username and password are still the default method of accessing secure accounts and information. Unfortunately, weak passwords, and poor password practices mean the password isn't providing very good protection in many cases. Read More

VLAN Lab Part 3: Final Answers to the Lab
Post Your Alternatives, TooThis week I'll wrap up the lab by showing what I think is the "best" (shortest) config to complete the lab variation #2 from last week's post. For those that missed the last two weeks, we're in the middle of a VLAN-oriented CCNA/CCNP lab, with an overarching goal of using the fewest commands, ala Name That Tune. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Goodies from the Subnets
We've got 15 copies of books up for grabs: Cisco Nexus Switching and Microsoft SQL Server 2008 R2 Unleashed. Enter to win one!

SLIDESHOWS

Ig Nobel honors world's wackiest researchers: 2010 winners
The 20th annual Ig Nobel Prizes were awarded Thursday night for "achievements that first make people laugh, and then make them think." The prizes commemorate the world's funniest research, and sometimes the world's biggest villains (BP is a winner this year). Here's a list of the 2010 prizes.

Eight hot commercial space projects
The recently passed NASA Authorization Act of 2010 was generally seen as a huge nod toward developing commercial space projects. NASA Administrator Charles Bolden said the authorization "launches a commercial space transportation industry." Indeed there are a number of interesting commercial space projects underway.

MOST-READ STORIES

  1. iPhone 4 to hit Verizon in early 2011
  2. Microsoft releases biggest-ever security update
  3. Cisco still haunted by 3-year-old Brazil case
  4. Data brokers digging up and selling your digital dirt
  5. Microsoft Wiffler lets smartphones use free Wi-Fi from moving vehicles
  6. Beefy Alcatel-Lucent switch targets Cisco, Juniper
  7. Seven secret weapons for network management on a budget
  8. To thwart keyloggers, Facebook introduces one-time passwords
  9. Microsoft: New virtualization software will boost Windows 7 upgrades
  10. Gain administrator access without a password

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: