Tuesday, June 05, 2012

Researchers reveal how Flame fakes Windows Update

Quiz: Can you navigate Windows 8? | Windows 8 test drive: Hardware is a challenge

Network World Microsoft

Forward this to a Friend >>>


Researchers reveal how Flame fakes Windows Update
Security researchers today published detailed information about how the Flame cyber-espionage malware spreads through a network by exploiting Microsoft's Windows Update mechanism. Read More


RESOURCE COMPLIMENTS OF: BYOD & Mobile Device Management Tech Seminar

BYOD & Mobile Device Management Tech Seminar - 6/26
During this one-day tech seminar, IT executives, managers and teams will learn how to successfully manage the onslaught of new mobile devices, along with the strategies and policies that can help avoid pitfalls and ensure success. June 26 - Omni Parker House, Boston Click to continue

WHITE PAPER: Extreme Networks

Delivering a Greener Data Center
This paper covers power utilization, intelligent power management and industry best practices for energy efficiency. Extreme Networks® takes a lifecycle approach to power efficiency, management and recycling, offering savings to our customers and promoting a greener world. Learn more.

Quiz: Can you navigate Windows 8?
Building on our general Windows 8 Quiz, here's a test of how well you have learned to get around in Microsoft's new operating system. Validate what you already know or use the quiz to learn new tips and tricks that will make climbing the learning curve for the platform less painful. Keep track of your answers and check your score at the end to see how well you did. Read More

Windows 8 test drive: Hardware is a challenge
Hardware will remain a key to satisfaction in Windows 8 based on a quick drive-through of the Release Preview version of the new Microsoft operating system. Read More

Microsoft throws 'kill switch' on own certificates after Flame hijack
Microsoft on Sunday revoked several of its own digital certificates after discovering that the makers of the Flame super-cyber spy kit figured out a way to sign their malware with the company's digital "signature." Read More


WHITE PAPER: Limelight

Warp Speed: The Nuts and Bolts of Web Acceleration Solutions
Enterprises are quickly realizing that they can't achieve the web performance they need by simply deploying their web server on a high-speed network. Improving page rendering speeds incrementally through content caching is no longer enough. It's time to look for dramatic performance gains by applying optimization techniques right at the browser. Learn More!

Windows 8's built-in AV to be security of last resort
Microsoft's Windows 8 will activate its built-in antivirus software only if it senses that the PC is not protected by another security program, says McAfee. Read More

This Windows 8 tablet might actually be a PC
The first announced Windows 8 tablet powered by an ARM processor does a lot to explain why Microsoft has persisted in calling any Windows 8 device a PC. Read More

Emergency Windows patch stops Flame malware from spoofing Microsoft security certificate
Microsoft released an emergency Windows update last night after discovering that components of the cyber-espionage Flame malware could trick customers by spoofing one of Microsoft's trusted digital signatures. The security advisory states, "Microsoft is aware of active attacks using unauthorized digital certificates derived from a Microsoft Certificate Authority. Read More


WHITE PAPER: IBM

Cloud Security: Who do you trust?
This white paper explains why trust, reliability and security decisions are central to choosing the right model. Learn More

Hacktivists UGNazi attack 4chan, CloudFlare and Wounded Warrior Project
The hacktivist collective UGNazi has been extremely busy attacking the Wounded Warrior Project, CloudFlare and the imageboard site 4chan. CloudFlare admitted to the attack, which allowed UGNazi hackers to change the DNS records for 4chan. Cosmo, thought to be the leader of UGNazi, tweeted about gaining access into CloudFlare and defacing 4chan. Read More

Male or female, who's the better social engineer? Battle of the SExes!
I'd be willing to bet that someone has successfully manipulated each of us at some point in our lives. If that manipulation was in regard to a love life relationship, to borrow from Living Colour, Cult Of Personality, "I exploit you, still you love me," people will have different answers for which sex is better at hacking the head and the heart. Read More

Windows 8, price drops to accelerate ultrabook growth, Lenovo says
While the viability of ultrabooks is being questioned, Lenovo product chief Peter Hortensius believes a drop in prices and the arrival of Microsoft's Windows 8 OS will signal a major shift in laptop computing and trigger more interest in the product category. Read More

Fedora Linux capitulates to Microsoft boot certificate
In order to get its Linux distribution to run on the next generation of secured desktop computing hardware, the Fedora Project will obtain a digital signature from Microsoft, a developer from the project announced Wednesday. Read More



SLIDESHOWS

Why the Internet needs IPv6
Explosive growth of Internet users, devices, apps creates demand for more IP addresses.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. BYOD's phone number problem
  2. Hacktivists UGNazi attack 4chan, CloudFare and Wounded Warrior Project
  3. Facebook posts its internal C++ software library
  4. Rehearsal is over, IPv6 goes prime time June 6
  5. Like Cisco, ALU finds reluctance to embrace cloud
  6. U.S. warns users of new Citadel ransomware hit
  7. iPhone 5 rumor rollup for the week ending June 1
  8. U.S. and Israel unleashed Stuxnet, says New York Times
  9. Is RIM ruined?
  10. Could data scientist be your next job?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_microsoft_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment