Search This Blog

Wednesday, June 13, 2012

Microsoft scrambles as it patches 26 bugs, warns users of active attacks

FTC: Data broker Spokeo to pay $800,000 for selling personal data to employers for background checks | Flame elevates security threat of USB drives

Network World Security

Forward this to a Friend >>>


Microsoft scrambles as it patches 26 bugs, warns users of active attacks
Microsoft patched 26 vulnerabilities, including one in Internet Explorer that's already being exploited. The company also warned customers of a new zero-day attack and quashed yet another instance of a bug that the Duqu intelligence-gathering Trojan leveraged. Read More


RESOURCE COMPLIMENTS OF: CIO Perspective

Balancing Business Needs with the Chaos of Mobile Security
Hear an engaging panel discussion featuring prominent IT leaders from Boston industries discuss how their companies are managing today's mega-trends for maximum business benefit. Learn about the CIO role around enablement vs. security, agility vs. integration, and business vs. IT technology resource control at CIO Perspectives Boston. Register Today!

WHITE PAPER: Oracle

Securing SOA and Web Services with Oracle Enterprise Gateway
Download this whitepaper, Securing SOA and Web Services with Oracle Enterprise Gateway, for a clear and concise understanding of how this one-stop solution can integrate, manage, and protect your businesses service-oriented architecture. . Learn More!

FTC: Data broker Spokeo to pay $800,000 for selling personal data to employers for background checks
The Federal Trade Commission today said data broker Spokeo will pay $800,000 to settle FTC charges it sold personal information it gathered from social media and other Internet-based sites to employers and job recruiters without taking steps to protect consumers required under the Fair Credit Reporting Act. Read More

Flame elevates security threat of USB drives
While USB drives have long been a security threat, the Flame spying malware brought the use of portable storage devices to a new level of weaponry. Read More

Bill proposes to protect Americans' privacy from warrantless drone surveillance
Didn't hear anyone yell "Fore," yet wonder if that is a golf ball in the sky? It's not; it's a drone and it's coming. Judge Andrew P. Napolitano warned about the "coming use of drones - some as small as golf balls - to watch us, listen to us and record us. Did you consent to the government having that power? Did you consent to the American military spying on Americans in America? I don't know a single... Read More


WHITE PAPER: Teradata

Cloud Computing Models for Data Warehousing
Gain better business intelligence through private cloud self service capabilities. In this whitepaper, analyst Mark Madsen explores why private cloud computing is a better choice to meet your analytical needs as business conditions fluctuate and grow. Learn more.

Global Payments says data breach investigation turned up a second breach
Global Payments, the electronic transaction-processing firm which acknowledged a data breach in April related to a suspected 1.5 million payment card numbers, yesterday said its ongoing investigation into that is turning up another issue: "potential unauthorized access to servers containing personal information collected from a subset of merchant applicants." Read More

Securing mixed cloud environments
Securing cloud computing environments is challenging enough, but is made all the more complicated when a mix of cloud options are employed, an approach that will become increasingly common. Read More

Is Microsoft right and W3C wrong about Do Not Track being turned on by default?
Some of us, including Senator Al Franken, believe privacy is a fundamental right. Choice is great, but it's also a problem since many users will not take steps to change settings and protect themselves or their privacy. Read More


WHITE PAPER: Fluke Networks

How to Choose a Datacenter OTDR
This white paper helps fiber installers and network technicians understand the key parameters for selecting an OTDR. Choosing the right device not only solves this new generation of datacenter testing requirements, but also helps professionals work efficiently, and increase the reliability and value of the enterprise fiber network. Learn More!

Revolutionizing the password, and other musings from the Infragard Day of Learning
On Friday, June 8, 2012, Philadelphia Infragard Day of Learning was held at a beautiful conference center owned by Pfizer. The multitude of FBI agents, local and not-so-local LEO's (Law Enforcement Officers), Digital Forensics people, and, well, suits, was pretty impressive in a "Where'd all the black t-shirts go?" kind of way. The talks, however, were great. Read More

INSIDER
Extinguishing Flame malware
Flame malware is considered ingenious by network security researchers. They say the botnet has the most complex command and control structures ever seen. Read More

Firefox 14 Beta Arrives with an Extra Shot of Security
Mozilla's new Firefox 13 browser may have just barely landed on users' PCs, but already forward-looking fans can check out the beta version of Firefox 14--and the Aurora version of Firefox 15, too. Read More

Cybersecurity expert argues FUD can be effective
Sensei Enterprises' Sharon Nelson said she does not advocate sowing panic on issues such as Stuxnet and Flame. But she believes FUD -- especially doubt -- "may make people question things." Read More



SLIDESHOWS

First Look: Apple's "beautiful" new MacBook lineup
Apple rolled out major upgrades for both of its main notebooks today at WWDC. Here's a quick look at the new MacBook Pro and MacBook Air.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Snopes.com debunks old C++ 'interview' hoax
  2. Steve Jobs' LSD habit, why he indulged in marijuana, and his 1975 arrest
  3. Critics call Apple iOS 6 'catch-up' technology
  4. 10 gadgets and gifts for your favorite Geek Dad
  5. Noam Chomsky disputes email history
  6. Juniper guns for Cisco again with smaller QFabric
  7. Cisco router software connects enterprises to the cloud
  8. Gartner: Network virtualization will lead to security control changes
  9. 5 things we love/hate about Windows 8
  10. Gartner: Top 10 emerging infrastructure trends

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: