Search This Blog

Tuesday, March 29, 2011

The Russian Cybermafia: RBN & the RBS WorldPay attack

McAfee's website full of security holes, researcher says | Should smartphones be allowed in the courthouse?

Network World Security Strategies

Forward this to a Friend >>>


The Russian Cybermafia: RBN & the RBS WorldPay attack
The Russian Business Network (RBN) is infamous for its involvement in malicious software, distributed DoS attacks, hacking, child pornography, and spam. Much like other Russian cybercrime syndicates the Russian Business Network had its roots in the old fashion selling hacking tools and services that could even penetrate many U.S. government systems. Read More


RESOURCE COMPLIMENTS OF: HP

Understanding VM Security Hype
Today's Virtual Switches Typically Lack Sufficient Monitoring Capabilities. Address virtualization security challenges an learn how to maintain trust zone definition through the workload lifecycle. Read now.

WHITE PAPER: EMC

Stay Ahead of Data Protection Challenges
If you still yearn for an infrastructure that can handle unpredictable data growth and enable you to enhance service levels, while ensuring data protection, read this ESG white paper. Learn how EMC is helping businesses completely transform their data protection processes. Read more now. Read now

McAfee's website full of security holes, researcher says
The McAfee.com website is full of security mistakes that could lead to cross-site scripting and other attacks, researchers said in a post on the Full Disclosure site on Monday. The holes with the site were found by the YGN Ethical Hacker Group, and reported to McAfee on Feb. 10, YGN says, before they were publicly disclosed to the security/hacking mailing list. Read More

Should smartphones be allowed in the courthouse?
Federal courts have been debating about how much freedom users of smartphones and portable wireless devices in general, should have in a federal courthouse.    Read More


WEBCAST: IBM

Malware is Everywhere
Get up to speed on the proliferation of security issues and hear about new techniques that combine IBM Rational AppScan and Internet Security Systems (ISS) technologies to scan and identify unwanted, embedded malware. View Now

No Conspiracy Theory Needed: Tor Created for U.S. Gov't Spying
There is an interesting post on Cryptome, TOR Made for USG Open Source Spying Says Maker, in which one of Tor's creators, Michael Reed, says to look at why the government created Tor from a common sense point-of-view instead of as conspiracy theory. Read More

Two-thirds OK with hosting games on company gear: survey
Granted, we're talking about an online survey of self-selected participants, but more than a thousand people responded to our poll about the propriety of hosting private video games on company equipment, and a solid majority – about 65% -- said they are OK with the practice. You can details here. The survey was run in conjunction with last week's story headlined: "On the company... Read More


WHITE PAPER: HP

Securing Virtualized Data Centers
Understand the real need for security solutions that can address the reality of expanding virtualization. You will also learn how HP TippingPoint's secure virtualization framework allows organizations to gain control of the virtual environment by introducing in-line security policy enforcement. Read Now

Cybercriminals selling exploit-as-a-service kit
Cybercriminals are taking a page from the software-as-a-service playbook: they're now selling exploit kits complete with hosting services, with customers paying for the length of time the exploits are actively infecting computers. Read More

Anti-Virus Software Driving You Mad? 5 Fight-Back Tips
Last week some Windows users struggled through unexpected PC slowdowns due to a security program bundled in with a Java update. Security programs still hog PC resources and pose annoyances -- but here's expert advice on how you can regain control. Read More

Companies pick and choose which data breaches to report
One in 7 information technology companies have not reported data breaches or losses to outside government agencies, authorities or stockholders. Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a Windows 7 Enterprise Technician class for three people. From Cisco Subnet: 15 copies of VMware ESXi books. Enter here.

SLIDESHOWS

Hot technology at the annual CTIA wireless show
CTIA Wireless offers a look at the evolving mobile landscape, from handsets and apps to core network systems. Here's a few of the things that are hot at the show in Orlando.

First look at Firefox 4
Firefox 4 has finally arrived, after months of delays and after rival Web browsers Internet Explorer 9 and Chrome 10 already shipped. The browser gets a speed boost and several feature enhancements that are so significant that they all have their own proper names, like Panorama, JaegerMonkey and Firefox Sync. Were they worth the wait? Let's take a look.

MOST-READ STORIES

  1. Paul Baran, Internet and packet switching pioneer, is mourned
  2. Microsoft scheme sniffs out unused wireless spectrum
  3. How Apple played hard to get and seduced the enterprise
  4. Apple holding out on iOS 5 until fall?
  5. Microsoft pays Nortel $7.5 million for IPv4 addresses
  6. AT&T-T-Mobile merger widely panned
  7. Nokia looks to make Windows Phone 7 hottest mobile OS
  8. Update Java and you may get annoying McAfee scanner too
  9. Is Skype a security risk that endangers your privacy?
  10. The RSA Hack FAQ

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_strategies_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: