Search This Blog

Tuesday, August 02, 2011

Windows XP is a Rootkit Spawning Pool

Apple patches iOS security certificate flaw for iPhones, iPads | Cloud Security Fears Exaggerated, Says Federal CIO

Network World Security

Forward this to a Friend >>>


Windows XP is a Rootkit Spawning Pool
If you're still dragging your feet on moving to Windows 7, consider this: a report from the Czeck antivirus firm Avast notes that three in four PCs infected with rootkits are running Windows XP, and it's not because so many people use aging operating system. Read More


WEBCAST: CA Technologies

Virtualization Done Right
View this webcast to learn the best practices for post implementation of virtualized servers in your environment. Discover what challenges to look out for and how to prepare to avoid pitfalls ensuring total protection for your systems, applications and data. Learn More

WHITE PAPER: Splunk

WhitePages Protects their Rich Database
Read how Spunk enabled them to protect the site's content and the WhitePages brand by monitoring abusive site traffic and learn how Splunk's in-house search eliminated a data warehouse investment. Learn more.

Apple patches iOS security certificate flaw for iPhones, iPads
The latest iOS update corrects a security flaw in how Apple's mobile OS handled security certificates. Without it, hackers can create their own certifcates, opening iPhone and iPad sessions to capture and decryption. Read More

Cloud Security Fears Exaggerated, Says Federal CIO
Outgoing federal CIO Vivek Kundra believes that cloud security issues ave been used to discourage cloud adoption. That's not stopping the Department of Homeland Security. Read More

Spaceflight contest blasts off
The company behind Seattle's iconic Space Needle wants to send you into space. The company, Space Needle LLC has teamed with space tourist company Space Adventures to blast someone into suborbital space to celebrate the Seattle structure's 50th anniversary. Read More


WHITE PAPER: Riverbed

Case Study – Constangy
Learn how to consolidate and virtualize many different servers, and eliminate the expense and difficulty of remotely managing the hardware and software. Read now!

Anonymous suspect 'Topiary' charged over DDOS attacks
The 18-year-old teenager identified by police as the spokesman for the hacking groups Anonymous and Lulz Security was charged on Sunday with five offenses and expected to appear Monday in a London court. Read More

European security group issues warning on HTML5
The European Union's computer security agency is warning that standards under development as part of HTML5 are undergoing rewrites that may neglect important security issues. Read More

Face recognition and social media meet in the shadows
Facebook will reach likely reach one billion users this year or next. Read More


WHITE PAPER: Riverbed

Streamline Business Continuity/Disaster Recovery Solutions
To succeed and thrive, today's organizations must create network environments that enable them to continue operations or recover in the shortest possible time. This paper provides practical advice for maintaining a functional DR strategy, and for streamlining business continuity solutions. Read More

Black Hat roundup: Let the electric-shock craziness begin
Ready to power on next week, the annual Black Hat Conference in Las Vegas promises to be the high-voltage event it has been in the past where security experts tear apart any naïve hope that there's really anything secure at all that was ever made by the high-tech industry. Read More

Who's stealing your data?
In a number of recent newsletters we've looked at spear-phishing and how it can make your employees, customers, clients and users into unwitting dupes of the crackers and malfeasants who are trying to steal the "family jewels" of your organization. Just ask the folks at RSA (who insist that they are the "security division" of EMC). Read More

EHRs are easy prey, but all is not lost
Christopher Burgess on writing a new prescription for health data trust. Read More



GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

SLIDESHOWS

Chromebooks you can buy now
Here's a roundup of computing devices that run Chrome OS, a few which you can buy now, or which may be on the way.

MOST-READ STORIES

  1. Android Trojan records phone calls
  2. Why Wi-Fi as we know it is in trouble
  3. System links your face to your Social Security number
  4. 10 technologies that will change the world in the next 10 years
  5. Apple iPad 3 prototypes everywhere
  6. HP extends Cisco switch trade-in program
  7. WIPO orders that iPods.com domain be transferred to Apple
  8. Advanced persistent threats force IT to rethink security priorities
  9. Windows XP is a rootkit spawning pool
  10. Skype for iPad finally arrives, then quickly disappears

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: