Search This Blog

Thursday, October 06, 2011

Check Point software takes aim at botnets

Drive-by download attack on Facebook used malicious ads | Use Profiling to Improve Snort Performance

Network World Security

Forward this to a Friend >>>


Check Point software takes aim at botnets
Check Point Software is coming out with technology designed specifically to fight bots by discovering infections, finding command and control servers and cutting off communications with them. Read More


WEBCAST: VeriSign

Webcast: 5 Best Practices for DDoS Mitigation
Examine DDoS mitigation challenges, why traditional tactics aren't enough, and go inside the 5 keys you must implement in order to minimize the impact of an attack. View now!

WHITE PAPER: HP & Intel

Read now
HP's Converged Infrastructure incorporates tools that make remote support and management efficient and effective. HP Insight Control, for example, helps reduce server deployment time from four hours to just 20 minutes, a 12-fold decrease in deployment time. Read now

Drive-by download attack on Facebook used malicious ads
Antivirus vendor Trend Micro has recently detected a drive-by download attack on Facebook that used malicious advertisements to infect users with malware. Read More

Use Profiling to Improve Snort Performance
Snort, the open source intrusion detection and prevention system (IDS/IPS), can be a fabulous tool to protect your network from attack – if it's set up correctly. If it's not, it can cause network traffic and performance problems. Here's a rundown of how to use Snort's built-in profiling tools to tune your setup and improve Snort's performance. Read More

NSS Labs offers reward money for fresh exploits
NSS Labs is sweetening the pot for its ExploitHub marketplace by offering rewards to security gurus who can write working exploits for a dozen "high-value" vulnerabilities. Read More


WHITE PAPER: Intel

Raise QoS in vSphere*4 with Dell & Intel
The industry transition to 10 Gigabit Ethernet (10GbE) is creating new quality of service (QoS) challenges. This paper examines best practices for analyzing, monitoring and controlling bandwidth in VMware vSphere 4.1 environments when using Dell servers and Intel Ethernet 10 Gigabit server adapters. Click to continue

The best picture of a high-tech car with big ears you'll see this year
This is a REAL car whisperer. The so-called MiMi Car is used as a way for Japanese car makers to grab information from attendees of the huge Japanese consumer electronics show, Combined Exhibition of Advanced Technologies (CEATEC). Read More

Amazon adds free encryption to storage service
Using Amazon Web Services' new Server Side Encryption feature, enterprises will at no extra cost be able to encrypt data stored on the company's Simple Storage Service (S3), Amazon said on Tuesday. Read More

Protect iPad data without hobbling users
Symantec plans to enable its data loss prevention server to work with iPads (even using iCloud) and, eventually, Android devices Read More


WHITE PAPER: Dell

Servers Rule: An Illustrated Guide
This guide highlights the savings and benefits of investing in your businesses' first server. Learn the advantages in security, remote access, and managability. Read now

Ten Security Essentials for the Networked Enterprise
The ideal information security environment is different depending on who you talk to. Your typical security engineer may say it must have firewalls, intrusion detection or any number of security focused technologies. Meanwhile a security tester may suggest that it is conducting penetration testing to provide assurances that security widgets are working well. Read More

Symantec updates flagship storage, high availability suites
In order to provide greater private cloud capabilities, Symantec announced new product versions of Veritas Storage Foundation 6.0, Veritas Cluster Server 6.0 and Veritas Operations Manager 4.1 and eight other products. Read More

Mobile security threats are heating up
Criminals, security researchers, vendors and even investors are now taking mobile security more seriously. Read More



SLIDESHOWS

26 helpful open source network management tools
Over the last decade or so, open source development has skyrocketed, and network management software has ridden that wave. Many frustrated IT administrators have turned to free tools to monitor, configure and map their networked devices. Here are 26 examples of open source network management software tools to help you do your job.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center and Microsoft training of the winner's choice from Webucator.. Enter here.Also: Please take our survey on certifications and your career

MOST-READ STORIES

  1. Steve Jobs gave Barack Obama an iPad 2 "a little bit early"
  2. Microsoft zapping Zune music player
  3. Apple unveils iPhone 4S
  4. Can Hotmail revamp win back GMail defectors?
  5. Red Hat raids cloud storage market by acquiring Gluster
  6. 2010 IT budgets, salaries on the rise, survey says
  7. 26 helpful open source network management tools
  8. CEO Steve Ballmer 'underpaid,' Microsoft says
  9. The new Novell
  10. Will the Mer Project keep MeeGo alive?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: