Search This Blog

Friday, November 12, 2010

Microsoft fixes critical DLL hole in Office but not XP SP3

FCC investigating Google over Street View | Protecting card data at the point of sale

Network World Security

Forward this to a Friend >>>


Microsoft fixes critical DLL hole in Office but not XP SP3
Patch Tuesday included Microsoft's first (and only) DLL hijacking patchThis month's fairly light Patch Tuesday included a critical patch for Microsoft Office that fixed a couple of dangerous issues, including Microsoft's first and only patch for the DLL hijacking vulnerability that made big news in August. The Office patch also included a fix for a scary drive-by exploit which could infect a PC if an evil e-mail showed up in the preview box of Outlook. Read More


WEBCAST: Websense, Inc.

Securing the Social Web
Organizations around the world are racing to take advantage of social networking and media like Facebook, LinkedIn, and YouTube. Along with these new resources, comes new risk as user-generated content circumvents traditional security technologies such as antivirus and URL filtering. View Now

WHITE PAPER: Trend Micro

Defending Against Spyware
The startling growth and deceptive methods of spyware can be easily attributed to profit motives. Spyware developers make money from the information that their software silently collects from unsuspecting users. Learn how to protect your information. Read More

FCC investigating Google over Street View
The FCC confirmed on Wednesday that it is investigating whether Google broke any federal eavesdropping laws when collecting data for its controversial Street View mapping service. Read More

Protecting card data at the point of sale
Best methods for navigating the POS security standard minefield Read More

Three charged with phishing after Sears investigation
Three men have been arrested on phishing charges after local police got a tip that somebody was sending boxes filled with computer equipment to abandoned houses in Lake Charles, Louisiana. Read More


WHITE PAPER: Sophos

How to implement a data loss prevention strategy
This paper guides IT professionals through the steps necessary to implement a practical data loss prevention (DLP) strategy. It starts off by quickly looking at what's driving data loss prevention, the consequences of data loss and how it can be comprehensively tackled using Sophos solutions. Read Now

Virus infecting phones in China costs you $300,000 a day
A virus masquerading as an antivirus application (how's that for irony?) has been infecting countless mobile phones in China. The virus lets hackers take control of the phone who then spam the phone's entire address with links that allow the virus to spread to even more phones. Read More

Security reality vs. feelings: Steinberger on Schneier
Bruce Schneier recently presented an excellent brief lecture as part of the TED series. One of his core ideas is that there are two basic ways we think about security: reality and feeling. Read More

Malicious websites increase by over 100% in a year
The number of malicious website on the net has increased by more than 100 percent, since last year, says Websense. Read More


WHITE PAPER: IBM

Protecting Sensitive Data in Non-Production Environments
The ideal data privacy solution must provide the necessary data masking techniques to satisfy the simplest and most complex policy requirements. These techniques must produce results that accurately mask context-sensitive data and include a way to propagate masked data elements consistently across applications and operating environments. Read now

NATO clause V could deter cyberattack, says defence minister
Cyberattacks should be subject to the same laws, treaties and international conventions as in the physical world, UK defence minister Nick Harvey has said in a Chatham House speech which laid down an important new marker in government attitudes. Read More

Women more likely to fall for Internet fraud
Women are significantly more likely than men to fall for Internet scams, a new piece of research has claimed after conducting an online test. Read More

Google vs Facebook: Adult supervision desperately needed
You'd think the drinking water in Silicon Valley has been replaced with baby formula, given how childish some of the biggest companies in tech have acted this year. First on the Romper Room roll call is Steve Jobs, who has thrown tantrums over Adobe Flash, Android, lost prototypes, the tendency of his uberphone to lose its signal when held the wrong way, and various other prickles that have lodged in his big boy pants. Read More

Firesheep, Blacksheep, and Protecting Your Wi-Fi Data
Despite the convenience, free public Wi-Fi networks like those found in hotels, Starbucks, and McDonald's are also a serious risk when it comes to your data and personal information. A new Firefox plug-in makes it even easier for tech novices to snoop wireless traffic, making it even more crucial than ever that users understand the risks and take precautions when using Wi-fi hotspots. Read More



Fill out a survey, get rewarded

Get a free Starbucks gift card for participating in a Network World survey about application performance management best practices. Research firm NetForecast is surveying enterprises about APM practices for an upcoming Network World article. The first 100 participants will receive a $5 Starbucks gift card. Click here.

Goodies from the Subnets
We've got SharePoint 2010 training for up to three people from Webucator up for grabs. There's an iPad available, too. Enter to win one!

SLIDESHOWS

Microsoft Windows after 25 years: A visual history
More than nine out of 10 computers run some version of Windows. But no one could have predicted that would be the case when Windows 1.0 launched 25 years ago as a graphical front end for MS-DOS. Here's a look at Windows through the years and some thoughts on what the future might hold.

Cool Yule favorites: 15 techie gifts we like
Ho Ho Ho, it's time again to get our holiday wish lists together. Here are our 15 favorite products from the 140+ products submitted and tested in this year's Cool Yule Tools holiday gift guide.

MOST-READ STORIES

  1. Red Hat releases RHEL 6
  2. Man loses $20 million after taking laptop for repair
  3. T-Mobile kicks off sales of Galaxy Tab
  4. Google employee axed over 10% raise leak
  5. Why Canonical should buy System76
  6. Cisco sends up a warning flare
  7. How Android conquered the mobile world in just three years
  8. Cool Yule Favorites: 15 techie gifts we like
  9. Apache to Oracle: We're leaving the Java Community Process
  10. Home and office gear gift ideas

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: