Search This Blog

Thursday, January 06, 2011

Worm Planted in Fake Microsoft Security Update

Military set to develop smart, robotic cameras | Microsoft warns of critical unpatched bug for Vista, XP

Network World Security


TOP STORY: Worm Planted in Fake Microsoft Security Update
It's Tuesday, time for more security patches from Microsoft right? Not quite. It seems the malware crowd is exploiting Microsoft's routine of releasing fixes on Tuesdays and sending out fake security emails bent on infecting their targets with a worm. Read More

WHITE PAPER: F5 and Infoblox DNS Integrated Architecture (F5 Networks)
As market leaders in the application delivery market and DNS, DHCP, and IP Address Management (DDI) market respectively, F5 and Infoblox have teamed up to provide customers with a complete DNS solution. Read now!

Military set to develop smart, robotic cameras
DARPA has contracted with 15 teams to begin building programs that will let machines or robots have visual intelligence similar to humans. In a move seemingly strait out of the Terminator movies, the Defense Advanced Research Projects Agency this week said it has contracted with 15 companies or universities to begin building software and hardware that will give machines or robots visual intelligence similar to humans. Read More

Microsoft warns of critical unpatched bug for Vista, XP
Zero-day in Windows Graphics Rendering Engine affects XP, Vista, Windows Server 2003Microsoft today confirmed that a publicly disclosed critical bug affects all of the current but older versions of Windows, and issued workaround advice but not an out-of-bound patch. The bug attacks the Windows' Graphics Rendering Engine in Vista, XP and Windows Server 2003. It does not affect Windows 7 or Windows Server 2008 R2. Read More

WEBCAST: Mobile Powerplay: Secure, High Performance, Unified (Cisco)
The mobile revolution is here—and here to stay. iPhone, iPad, Droid--employees bring their mobile devices into the workplace, and they want access to personal and professional information. This brings a new set of concerns for IT and the business: IT needs to ensure that the corporate network and the access remains secure. Register Now

Overclock Your Smartphone, If You Dare
WARNING: Overclocking is not for the faint of heart. Do not attempt to hack your phone unless you understand and accept the risks of turning it into a useless "brick." Read More

Europol to reveal cybercrime risk level
European law enforcement agency Europol on Friday will present its assessment of the threat posed by cybercrime, along with its strategy to tackle it. Read More

WHITE PAPER: Bailing Out Your Budget: How to Lower Your TCO (Websense, Inc.)
The Websense® TRITON™ solution is a unified content security solution that not only delivers better protection against modern threats but also does so with the lowest total cost of ownership (TCO). Read More

PHP floating point bug crashes servers
A bug in the PHP scripting language could crash Web servers with large floating point numbers Read More

Microsoft, Googler tussle over bug timeline
Microsoft and a Google security engineer are sparring over a bug the researcher reported to Microsoft last July. Read More

WHITE PAPER: Data Loss Prevention: Keep Sensitive Data-In-Motion Safe (Watchguard)
Though revolutionary to business, new web applications have also increased security risks, hurt productivity, and eaten up bandwidth. Read this white paper to find out how WatchGuard Application Control lets you take back control of your network keeping more than 1,500 applications – like Facebook, Skype, YouTube - in check. Read now!

Recalculating the telephony security equation
Among the threats that keep IT security managers up at night, attacks against phone systems have often ranked near the bottom. The last time we asked IT leaders about their telephony security plans, just 2% had experienced a security incident, and in almost all of these cases, the attack was internal misuse of phone systems for personal long-distance calls. Few had developed any sort of comprehensive security or risk analysis plan covering their voice systems. Read More

What it's like to make the wrong job switch
Some of you know the drill: You've been in the same job a long time and you start to feel bored, frustrated, complacent, or maybe a mix of those things. You get an offer from another company that promises you more money, more travel and more opportunity to make a mark on the security world. Read More

Kneber botnet strikes again, targets gov't agencies
A botnet fingered for stealing a treasure trove of information last year has struck again, harvesting sensitive documents from dozens of government agencies and contractors, according to security experts. Read More

CA Court Rules Smartphones Can Be Searched Without A Warrant
The California Supreme Court ruled that police can search a suspect's cell-phone text messages without a warrant, based on past cases where cigarette packs can be searched. A smartphone stores vast amounts of personal data, not even in the same realm as a pack of smokes. In this electronic age, the government moves America closer to a creepy police state.More bad news on the privacy front pushes us closer to an police state in an electronic age. Monday, in a 5-2 split decision [PDF], the California Supreme Court ruled that police do not need a warrant before searching cell phone text messages of someone who has been arrested. Read More


BECOME AN INSIDER
Get premium content, in-depth reviews, practical tips and exclusive research. All for just signing up. Sign up for free today.

SLIDESHOWS

The weirdest, wackiest and stupidest sci/tech stories of 2010
It's hard to pick the weirdest and wackiest tech stories of 2010 considering there is so much nuttiness to choose from. But we'll give it a shot. Here we take a look at a number of stories that gave us pause in 2010.

2010's most popular iPad apps
As the iPad celebrates its first birthday, it should raise a glass to Apple's App Store, which has provided users with an array of innovative applications. Late last week, Apple released a list of the 10 most popular iPad applications, with productivity apps making up the bulk.

MOST-READ STORIES

  1. 30 most anticipated tech products of 2011
  2. Worm planted in fake Microsoft security update
  3. HTC EVO Shift vs. the original EVO 4G
  4. At CES, Lenovo marries Windows and Android
  5. U.S. begins sophisticated wireless jamming project
  6. New high-speed I/O interface debuts at CES
  7. Skype launches mobile video calling app
  8. CES 2011 Preview: Gadgets galore
  9. Oversupply sends DRAM prices to one-year low
  10. Asus unveils three tablets and a slate

Get more IT peer perspective online:
LinkedIn Group | Facebook | Twitter



You are currently subscribed to networkworld_security_alert as security.world@gmail.com.
Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: