Search This Blog

Monday, January 09, 2012

FBI warns of new Zeus-based malware in phishing scam

Security roundup: DOD revving up cyber-defense for 2012; Microsoft to have big January Patch Tuesday | Symantec confirms source code leak in two enterprise security products

Network World Security

Forward this to a Friend >>>


FBI warns of new Zeus-based malware in phishing scam
So long as people click on unsolicited attachments in email, scammers will invent new ways to take their money, identities and more. Read More


WEBCAST: ForeScout Technologies

Experts Help CIOs Rethink Threat Prevention
This webcast examines sophisticated and targeted threats, security gaps, techniques and new technologies with regards to understanding and defending against zero-day threats, propagating worms, low-and-slow attacks and advanced persistent threats (APT). Learn more.

WHITE PAPER: EdgeWave

6 important Steps to Evaluating a Web Filtering Solution
Today's uncertain economic climate demands that you do a thorough assessment before you invest. Here's a concise list of steps that will help you achieve the best return on your Web filtering dollar. Read Now!

Security roundup: DOD revving up cyber-defense for 2012; Microsoft to have big January Patch Tuesday
Buried in the lengthy National Defense Authorization Act for Fiscal Year 2012, the $622 billion defense spending bill which was signed into law by President Obama on Dec. 31, 2011, are some interesting nuggets about how the U.S. military wants to expand its cyber-defense strategy over the course of this year. Read More

Symantec confirms source code leak in two enterprise security products
Symantec late Thursday confirmed that source code used in two of its older enterprise security products was publicly exposed by hackers this week. Read More


WHITE PAPER: Bradford Networks

(BYOD) Unleashed in the Age of IT Consumerization
IT departments need to understand what devices are trying to connect to their networks, so they can provide convenient, secure access to those that are authorized, including personal iPads and smartphones. This white paper explains how IT departments can implement a practical and secure strategy and offer the convenience mobile devices provide. Read more

Smartphone/stun gun ranks as one of TSA's top finds for 2011
Apple, HTC, Samsung, RIM and other smartphone makers are really outdoing themselves these days cranking out new must-have smartphones. But to our knowledge, none of them have yet gotten to the point where they've intentionally started to sell combination smartphones/weapons. Read More

EPA wants your environment pictures, issues public photo challenge
Challenges from US government agencies are all the rage these days and the Environmental Protection Read More


WEBCAST: Aternity

Banish Poor Application Performance
Are you ready to gain the proactive ability to rapidly respond to end user problems (before they call the help desk)? Then you won't want to miss a special event that will show you the latest innovation in end user monitoring. Learn more

E-voting machine freezes, misreads votes, U.S. agency says
An electronic ballot scanning device set for use in this year's presidential elections, misreads ballots, fails to log critical events and is prone to freezes and sudden lockups, the U.S. Elections Assistance Commission found. Read More

WhatsApp to roll out stronger fixes for messaging vulnerability
WhatsApp has patched a security flaw in its WhatsApp Messenger mobile app after someone set up a website allowing anyone to change a user's status update. Read More

Developers top IT hiring managers' wish lists
Hiring developers is the top priority for today's IT staffing pros, according to Dice.com. The IT jobs site polled 1,200 tech-focused hiring managers and recruiters, and Java developers ranked first among 10 staffing priorities for 2012. HELP WANTED: 7 hot jobs for 2012 Read More

The weirdest, wackiest and coolest sci/tech stories of 2011
This year we find horses helping to build the Internet, Apple having all the money in the world and way more wackiness Read More



SLIDESHOWS

10 essential data center appliances
With all of the noise in data center networking focused on switches, fabrics and lossless Ethernet standards, appliances like WAN optimizers and application accelerators are often overlooked. But they are important components of the data center/cloud infrastructure, especially as organizations virtualize desktop applications for remote sites. Here's a listing of 10 of the top players, and their products, in data center appliances.

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. IPad 3 rumor rollup for the week ending Jan. 3
  2. Who's lying? The iPad owner or the border guard?
  3. Microsoft patch blows 'perfect game' but sends important message
  4. 9 hot technology startups to watch in 2012
  5. Cisco dumps the UMI personal telepresence very quietly
  6. iPhone 5 rumor rollup for the week ending Dec. 31
  7. Software whiz Ray Ozzie re-emerges with startup Cocomo
  8. 2 days for amateur hacker to hack smart meter, fake readings
  9. IT pros lament: Low pay, no perks
  10. Facebook Timeline scams prey on wishful thinking

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: