Search This Blog

Friday, August 05, 2011

Critical fixes for Windows and IE coming in big Patch Tuesday

Black Hat: Routers using OSPF open to attacks | Corporate cybercrime costs skyrocket

Network World Compliance

Forward this to a Friend >>>


Critical fixes for Windows and IE coming in big Patch Tuesday
In another big Patch Tuesday, Microsoft will release 13 patches next week covering 22 vulnerabilities, including two critical patches to prevent remote code execution attacks in Windows and Internet Explorer. Read More


WEBCAST: Cymphonix

Gain Complete Control Over Internet Bound Traffic
The Cymphonix Network Composer is the only network appliance that provides comprehensive clarity into all internet bound network traffic and simply powerful tools to manage that traffic with a holistic approach. Learn More Today!

WHITE PAPER: Kaseya

How to Launch a Successful IT Automation Initiative
In this paper, we'll look at IT automation from the corporation's perspective, and discuss the steps organizations should take before launching such an initiative. We'll hear from companies that successfully implemented computer automation platforms, what their early steps were and what they would do differently if they could repeat the process. Read now

Black Hat: Routers using OSPF open to attacks
A researcher at Black Hat has revealed a vulnerability in the most common corporate router protocol that puts networks using it at risk of attacks that compromise data streams, falsify network topography and create crippling router loops. Read More

Corporate cybercrime costs skyrocket
Security threats such as malware, insider attacks, phishing, botnets and a host of other problems are costing large corporations more money to handle. Read More

Apple Gets Serious About iPad Security, Is It Enough?
Soon, SAP hopes to sew up a gaping security hole for its 7,000 iPad-toting employees. The Germany-based tech giant is beta testing a product that will allow it to send PGP-encrypted confidential email to employees. In turn, employees will be able to decrypt them using a Symantec viewer iPad app. Read More

Advanced persistent threats force IT to rethink security priorities
The biggest business challenge today, in the minds of many information security officers, is the stealthy online infiltration by attackers to steal valuable proprietary information. The reality, they say, is that these so-called "advanced persistent threats" are so rampant and unrelenting they are forcing IT to rethink network security. Read More


WHITE PAPER: CA Technologies

Three steps to agile change
Comprehensive IT change configuration and release management (CCRM) continues to confound and frustrate both IT and the business units for which it provides services. But by first instituting the appropriate foundational processes and supporting tools, many enterprises are experiencing renewed CCRM success. Read Now

Black Hat: Hackers and crackers needed to counter terrorists
Hackers and crackers heard a patriotic plea during a Black Hat keynote in which they were portrayed as potential heroes as terrorism shifts from acts of physical violence to cyberattacks that can also cause physical destruction. Read More

Check Point has sights set on 1Tbps firewall
Check Point Software has new, heavy-duty security gateway hardware for data centers and service providers, including one chassis that will grow to support a 1Tbps firewall. Read More

Black Hat: Lots of hacks and a patriotic plea
Black Hat hasn't disappointed this year, with research revealing a flaw that undercuts OSPF routing, two separate assertions that security for Apple products in the enterprise isn't that bad and a friendly hand being offered to hackers and crackers to join the U.S. fight against terrorists in cyberspace. Read More

Researcher follows RSA hacking trail to China
Malware used in the attack against RSA Security earlier this year was controlled from China, a well-known botnet researcher said Wednesday. Read More


WHITE PAPER: Motorola

Less Cost and Congestion. More Performance and Trust
Giving brainpower to WLAN access points results in: • Intelligent direct routing • Network-aware access points that can easily reroute around overloaded components • Detection of RF interference • AP flexibility and options from AP 621 to AP 7181 Read now!

EHRs are easy prey, but all is not lost
Christopher Burgess on writing a new prescription for health data trust. Read More

Spike in mobile malware doubles Android users' chances of infection
An explosion in mobile malware during the last six months has more than doubled the chance that a user's Android smartphone will become infected, a security researcher said today. Read More

McAfee gets defensive: Massive cyber attack revelation not being used as a security sales tactic
McAfee today published a report that tells how it discovered evidence in a server on the Internet of stealthy intrusions, probably by an unnamed "nation-state," into 72 businesses and government agencies since 2006. The goal, says McAfee, is to steal massive amounts of confidential information. Read More

Microsoft kicks off $250,000 security contest
Microsoft today launched a $250,000 contest for researchers who develop defensive security technologies that deal with entire classes of exploits. Read More

Researchers show off homemade spy drone at Black Hat
A pair of security researchers Wednesday unveiled a remote controlled, unmanned aerial vehicle capable of cracking Wi-Fi passwords, exploiting weak wireless access points and mimicking a GSM tower to intercept cell phone conversations. Read More

LulzSec gets Google+ boot, but returns
Hacker group LulzSec ("the world's leaders in high-quality entertainment at your expense") has had its initial Google+ account nixed this week, though LulzSec has quickly and brashly re-emerged with a new one Read More



GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

SLIDESHOWS

Chromebooks you can buy now
Here's a roundup of computing devices that run Chrome OS, a few which you can buy now, or which may be on the way.

MOST-READ STORIES

  1. Computer scientist calls for Web search shake-up
  2. 5 surprising IT skills that hiring managers want now
  3. Another Facebook Zuckerberg wants to kill off anonymity
  4. BlackBerry Torch: Specs are right, but what about the OS?
  5. U.S. wants to build cybersecurity protection plan for cars
  6. Google accuses Microsoft, Oracle, Apple of 'hostile' patent campaign
  7. Android Trojan records phone calls
  8. Moves afoot in U.S., elsewhere to end PSTN copper lifeline
  9. 10 technologies that will change the world in the next 10 years
  10. EU ministers seek to ban creation of 'hacking tools'

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: