Search This Blog

Friday, August 31, 2012

Mysterious Wiper malware possibly connected to Stuxnet and Duqu, researchers say

Java security threats: What you need to know | The Security Skills Shortage Is Worse Than You Think

Network World Security

Forward this to a Friend >>>


Mysterious Wiper malware possibly connected to Stuxnet and Duqu, researchers say
Security researchers from Kaspersky Lab have uncovered information suggesting a possible link between the mysterious malware that attacked Iranian oil ministry computers in April and the Stuxnet and Duqu cyberespionage threats. Read More


WHITE PAPER: F5

Three Phases to Improve Application Delivery Teams
Most organizations struggling with application performance have not developed the processes and organization that can maximize the benefits of their application delivery solutions. In this report, Gartner outlines three phases to help IT organizations improve their structure to deliver better application performance. Learn More!

WEBCAST: IBM

Changing the Competitive Dynamics of the Business
Date/Time: June 5, 2012, 11:00 a.m., EDT, 4:00 p.m. BST / 3:00 p.m. UTC Please join us for this webcast, as Dr. Barry Devlin, Founder and Principal, 9sight Consulting, describes what operational analytics can do for your business and reviews an architectural approach that will enable you to make it a reality. Register Now

Java security threats: What you need to know
First, the bad news. Once again, Mac users are at risk due to a flaw in Java, similar to the one that enabled the Flashback Trojan. Even worse, there isn't (yet) a patch to fix that vulnerability. But don't worry: This time around, there's good news for Mac users: Thanks to changes Apple has made, most of us are likely to be safe from this threat. Read More

The Security Skills Shortage Is Worse Than You Think
I've written a lot about the security skills shortage but it is worth reviewing a bit of data here for context. According to ESG Research, 55% of enterprise organizations (i.e. those with more than 1,000 employees) plan to hire additional security professionals in 2012 but they are extremely hard to find. In fact, 83% of enterprises claim that it is "extremely difficult" or "somewhat difficult"... Read More

Cloud security company Zscaler attracts $38 million in funding
Cloud-security provider Zscaler Thursday announced it has received $38 million in venture-capital funding, naming Lightspeed Ventures as a strategic investor but not the other venture-capital partners involved in the round. Read More


WHITE PAPER: Blue Coat Systems

Optimize and Secure Cloud, SaaS, BYOD, and Social Media
Today's threat landscape has migrated to the web causing many security professionals to prevent direct Internet access at the branch. But with new cloud-based security solutions from Blue Coat you can re-architect your network to embrace the Internet – safely – and optimize application performance. Learn more.

'Team GhostShell' hackers use SQL weakness to raid 100 websites
With LulzSec now apparently long gone, hacking group 'Team GhostShell' appears to have taken up its mantle with a weekend hacking raid it claims wrested 1 million database records from a 100 different websites. Read More

Will cyberattacks define the future of war?
Is the future of warfare going to be fought by soldiers using bullets, bombs and missiles -- or by computer geeks hunched over a laptop? Both, say experts in cyber conflict. Read More

Hackers shift to outflanking the first line of defense
Cybercriminals are shifting tactics to bypass corporations' first line of defense, which typically include antivirus software, firewalls and intrusion prevention systems, a study released on Wednesday shows. Read More


WHITE PAPER: Red Hat

Hybrid Cloud Storage: Getting the Best of Two Worlds
In this report we look at each component of Hybrid Cloud Storage as users of this new technology will be able to choose where to locate their data, on-premise with Scale-out NAS or in the Public Cloud. Learn More

Leaky web sites provide trail of clues about corporate executives
You can read about Zappos' CEO Tony Hsieh on the company's Web site-- about how he sold his first company, LinkExchange to Microsoft in 1999, at the age of 24, and joined Zappos as an advisor and investor, eventually rising to the company's top post. What you might not learn is that Tony is an exercise enthusiast who gets his gear from Nikeplus.com, watches his favorite shows on the Internet streaming site Hulu, keeps up with his friends on Facebook and checks the value of his Amazon.com stock (Amazon bought Zappos in 2009) at Marketwatch.com. That lesser known information about Hsieh -- a treasure trove for hackers -- is public, all the same: leaked from e-commerce and social networking sites linked to the CEO's @zappos.com e-mail address. Read More

Citizen Lab discovers mobile malware: FinFisher spyware variants target smartphones
On the heels of the patent battle with Apple, Samsung surprised the world today by announcing in Berlin that it launched the world's first smartphone using Microsoft's latest mobile software. However, we're going to look at how the Gamma Group's FinFisher spyware has gone mobile to infect smartphones. The mobile surveillance malware targets Windows Phone, Apple's iPhone and iPad tablets, Google's Android,... Read More

How malware defeats strong security controls
It's widely acknowledged that the computer networks of organizations large and small are under sustained attack. As networks become more heavily and broadly used, the potential impact will continue to grow. Read More



SLIDESHOWS

Hot Products at VMworld 2012
Click through all the products being released at VMworld in San Francisco this week.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Windows 8 is awesome ...
  2. 18 great IT tools for Android
  3. James Bond chooses Sony Xperia T over iPhone 5
  4. Second Java zero-day found: Time to disable it, say experts
  5. Tech CEOs' first jobs
  6. 5 reasons Android users will switch to the iPhone 5
  7. HP announces Envy X2 tablet-laptop hybrid device with Windows 8
  8. VMware joining OpenStack delayed, for now
  9. Six ways to protect against the new actively exploited Java vulnerability
  10. Juniper dumps BitGravity CDN tech

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: