Search This Blog

Monday, February 13, 2012

Microsoft to issue more critical patches next week for Win7 than XP

How to get the IRS' attention: Forge nearly $8 million in tax returns, steal identities | Ruh Roh, Now The Bad Guys Are Using Open Source Too

Network World Security

Forward this to a Friend >>>


Microsoft to issue more critical patches next week for Win7 than XP
Microsoft today said it would deliver nine security updates next week, four of them critical, to patch 21 vulnerabilities in Windows, Internet Explorer (IE), Office, .Net and Silverlight. Read More


RESOURCE COMPLIMENTS OF: Aruba Networks

Introducing Secure BYOD over any vendor's network.
Join us on Feb. 21, 2012 as we unveil the industry's only multivendor BYOD networking solution. Aruba engineers will demonstrate how you can optimize your existing network to embrace devices of all types. This event will also feature IT architects from Sandisk, Cadence and the University of Washington, who will be sharing their BYOD experiences.

RESOURCE COMPLIMENTS OF: Palo Alto Networks

Modern Malware for Dummies eBook
Download Free Modern Malware for Dummies eBook and learn how to stop the most dangerous threats facing your network. This book provides an in-depth analysis of how modern malware works and outlines the specific actions and technologies needed in order to regain control over today's malware. Click to continue

How to get the IRS' attention: Forge nearly $8 million in tax returns, steal identities
A former Internal Revenue Service employee this week got 105 months in prison for pleading guilty to theft of government property and aggravated identity theft in a case where the guy tried to get away with nearly $8 million in fraudulent tax returns. Read More

Ruh Roh, Now The Bad Guys Are Using Open Source Too
What is good for the goose, is good for the gander, right? Open source has been so successful in giving us software like Linux, Apache, Hadoop, etc., why wouldn't the open source method work with other types of software? Probably no one expected that the criminals behind vast malware trojans would adopt open source methods to make their malware more dangerous, but they have. Read More

Google expands the scope of its vulnerability reward programs to cover Chromium OS
Encouraged by the success of its Web and Chromium vulnerability reward programs, Google has decided to expand their scope in order to cover security issues in Chromium OS as well. Read More


WHITE PAPER: Shoretel

SIP Trunks and UC security
This white paper examines security considerations when using SIP trunks as a means of connecting Unified Communication Systems to the outside world. Read now!

Blogger exposes major Google Wallet security flaw
If you took one look at Google Wallet and said to yourself, "There's no way that's completely secure," it turns out you were right. Read More

Space junk funk: The anniversary of the Cosmos/Iridium satellite crash
On Feb. 10 an Iridium satellite did the unthinkable – it crashed into an inactive Russian Cosmos-2251 military satellite some 500 miles above Siberia Read More

Web app lets enterprise set security, sharing for Google Apps users
A new security tool lets enterprise IT groups set access and share policies for employees, including mobile users, who are working with the online Google Apps suite. Read More


WHITE PAPER: HP, Microsoft & Intel

HP Business Data Warehouse Appliance
The HP Business Data Warehouse Appliance optimized for SQL Server 2008 R2 is designed and tuned for data marts and small-scale data warehouses, providing a single view of data across your business. Learn more

"Virginia is for drones?"
"Virginia is for drones" might be the new catch-phrase for the state if its senators succeed in bringing a major unmanned aircraft flight test center to the area. Read More

M86 Security Labs report provides insight to plan security for 2012
The researchers at M86 Security Labs have just released their semiannual report about security trends and malware, spam and phishing activities they observed in the latter half of 2011. Use the 20/20 hindsight of this report to plan ahead for your security measures in 2012. Read More

10 business skills every IT pro must master
Here are the 10 business skills that truly matter to your career in IT. A lot. Read More



SLIDESHOWS

Hot authentication tools
User name and password doesn't cut it anymore in the world of online financial transactions. New federal rules call for multi-factor authentication schemes to combat growing threats. The latest multi-factor measures focus on biometrics, advanced analytics, and out-of-band techniques utilizing smartphones.

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. No, Wikipedia has not forgiven GoDaddy for backing SOPA
  2. FBI unbolts Steve Jobs 1991 investigation file
  3. Cisco still dragging feet on OpenFlow
  4. Amazon attacks Apple: You get 3 Kindle products for price of iPad 2
  5. iPhone 5 release set for summer 2012 -- report
  6. Microsoft to issue 9 patches, 4 critical
  7. Four crazy tech ideas from Google's Solve for X project
  8. iPad 3 on track for early-mid March release
  9. Mobile World Congress sneak peek
  10. Buyers lining up for Raspberry Pi's PC

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: