Search This Blog

Wednesday, January 12, 2011

Microsoft fixes two Windows bugs but leaves five security holes unpatched

Top 10 Tech Scares of the Decade | Cloud Computing Used to Hack Wireless Passwords

Network World Security

Forward this to a Friend >>>


Microsoft fixes two Windows bugs but leaves five security holes unpatched
Microsoft kicks off 2011 with light Patch Tuesday Microsoft gave the security a world a light Patch Tuesday today, with only two updates, after issuing a record 106 security bulletins in 2010 and 17 in December alone. But that doesn't mean Microsoft products have no holes in them. In fact, security researchers say there are five unpatched zero-day flaws that Microsoft is still working to fix. Read More


RESOURCE COMPLIMENTS OF: Sophos

FREE Data Leakage for Dummies Book from Sophos
You need to protect your company's most valuable asset – your data. Request a book today!

WHITE PAPER: Phone Factor

Your Guide to Evaluating Two-Factor Authentication Solutions
Passwords are a known weak link and continue to be exploited, making two-factor authentication mandatory for many organizations. Whether you're planning to implement for the first time or are looking to expand your current implementation, this whitepaper will help you choose the two-factor solution that is right for your business. Learn More

Top 10 Tech Scares of the Decade
The dawn of the new millennium prompted fears about the future, but so far reality has not quite matched the predictions of catastrophe. The first ten years passed uneventfully--well, aside from Y2K and a bunch of intelligent computer viruses. Here's a look back at the past decade, and ten of the most terrifying tech scares. Read More

Cloud Computing Used to Hack Wireless Passwords
German security researcher Thomas Roth has found an innovative use for cloud computing: cracking wireless networks that rely on pre-shared key passphrases, such as those found in homes and smaller businesses. Read More


WHITE PAPER: Sophos

What is FakeAV?
FakeAV or Fake AntiVirus, also known as Rogue AntiVirus, Rogues, or ScareWare, is a class of malware. This paper provides insight into where FakeAV comes from, what happens when a system is infected with FakeAV, and how users can protect themselves from FakeAV. Read Now

Intrusion protection tools improve on tests
The latest tests of crucial equipment used to protect Internet-facing corporate networks show they are improving but are far from perfect in stopping hacker attacks. Read More

Mobility management in 2011 and beyond
Let's hope that 2011 is a year when mainstream enterprises start getting serious about mobility management and security. Read More


WHITE PAPER: Quantum Corporation

Securing Data Stored On Tape With Encryption
With companies storing data for longer periods of time to meet compliance regulations and business best practices, the inherent risk of a data breach is growing significantly. Read Now

Homegrown Software is Not Secure
Nearly one-third of critical infrastructure organizations have suffered a security breach of internally-developed softwareAsk 100 security professionals to name a weak link in the cyber security chain, and a majority will point to software vulnerabilities. This is especially true in two areas: 1) Internally-developed software where developers may lack the skills or motivation to write secure code, and 2) Web applications where rapid development and functionality trump security concerns. How vulnerable are today's... Read More

IBM: Electric cars face consumer concerns despite high interest
IBM study shows electric car pitfalls, potentialHigh gas prices alone will not fuel an electric car revolution, rather if the auto industry could address a variety of other concerns having to do with recharging, convenience and cost it would Read More

Hacked iTunes accounts taken off China e-commerce site
The sale of hacked iTunes accounts in China has been dealt a blow as the Chinese online retailer Taobao.com has decided to remove all product listings relating to the sale of the stolen accounts. Read More



BECOME AN INSIDER
Get premium content, in-depth reviews, practical tips and exclusive research. All for just signing up. Sign up for free today.

SLIDESHOWS

The weirdest, wackiest and stupidest sci/tech stories of 2010
It's hard to pick the weirdest and wackiest tech stories of 2010 considering there is so much nuttiness to choose from. But we'll give it a shot. Here we take a look at a number of stories that gave us pause in 2010.

2010's most popular iPad apps
As the iPad celebrates its first birthday, it should raise a glass to Apple's App Store, which has provided users with an array of innovative applications. Late last week, Apple released a list of the 10 most popular iPad applications, with productivity apps making up the bulk.

MOST-READ STORIES

  1. What Verizon's network can -- and can't -- give iPhone users
  2. Apple and Verizon: The bumpy road to love
  3. Apple iPhoneys: the iPhone 5 edition
  4. Verizon to make iPhone announcement tomorrow
  5. Gov't allegedly forced TruTV to yank FEMA camps episode
  6. Cisco compacts Catalyst switches
  7. Steve Ballmer ousts Bob Muglia from Microsoft
  8. Digg founder: Don't buy an iPad now
  9. AT&T exec says CDMA iPhone users won't like 'life in the slow lane'
  10. NSA breaks ground on Utah 'spy center' data center

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: