Search This Blog

Thursday, October 11, 2012

Patches for critical Word flaw, RSA key length, clerical timestamp code-signing error

  What are grand technology and scientific challenges for the 21st century? | How to Defend Against Malnets
 
  Network World Security

Forward this to a Friend >>>


Patches for critical Word flaw, RSA key length, clerical timestamp code-signing error
There was a somewhat strange security update rolled out on Patch Tuesday, being that it does not address a security flaw, but rather a clerical timestamp error on binaries; this code-signing error will cause the digital signature on files produced and signed by Microsoft to expire and become invalid prematurely. Because "of the two k Read More


WHITE PAPER: AccelOps

Enabling Data Center and Cloud Service Management
Read this white paper to learn how the combination of discovery, data aggregation, correlation, out-of-the-box analytics, data management, and reporting can yield a single pane of glass into data center and IT operations and services. Learn more.

RESOURCE COMPLIMENTS OF: LogMeIn

LogMeIn Central: Automate, Monitor and Manage PCs.
LogMeIn lets you Monitor and Manage PCs, deliver patches and updates to multiple PCS simultaneously. Central helps IT deliver seamless support that keeps employees productive and up and running. LogMeIn Central - automate routine tasks and do more. Free Trial

What are grand technology and scientific challenges for the 21st century?
What are the next Big Things in science and technology? Teleportation? Unlimited clean Energy? Read More

How to Defend Against Malnets
Since 2011, security firm Blue Coat Systems has been tracking malnets: extensive distributed network infrastructures embedded in the Internet and designed to deliver mass-market attacks on a continuous basis. These malnet infrastructures are like the proverbial Lernaean Hydra--chop off one head, like a botnet it has produced, and two more spring up to take its place. Read More


WHITE PAPER: FandoTech

Understanding Recovery vs. Continuance
Understanding the difference between "disaster recovery" and "business continuance" is imperative to finding the right-fit backup, recovery and restoration solution for any organization. Consider the 4 business factors that drive RPO and RTO requirements essential to surviving unplanned outages. Learn more.

U.S. banks warned of another attack threat
Just as one type of attack against U.S. banks has subsided, the banks are being warned to get ready for another, called "Project Blitzkrieg," aimed at online theft. Read More

U.S. security vendors wary of Chinese telecom suppliers, call for transparency
U.S. IT security vendors surveyed about the Congressional report this week that blasted China's Huawei and ZTE as threats to U.S. national security say that the companies shouldn't be ruled out as network equipment suppliers but that they need to be more transparent about their dealings with the Chinese government. Read More


WEBCAST: Teradata

Big Data Done Right
View this on-demand webcast to learn how to reap the benefits of big data through a practical unified architecture; how to improve performance with in-memory technology; and how to lower costs and increase scalability through cloud computing. Register now.

U.S. concerns over Chinese tech manufacturers understandable, experts say
China's secrecy and close ties with domestic companies justifies a little paranoia on the part of U.S. companies and government agencies planning to do business with Chinese tech companies, experts say. Read More

Huawei: Separating fact from fiction
Chinese telecom provider Huawei was hardly a household word a few months ago, but it's had lots of negative publicity of late, from an Economist cover story to a 60 Minutes piece. Read More

 
 
 

SLIDESHOWS

Top 10 cloud jobs
Researchers at Dice.com have crunched the numbers to come up with a list of the top 10 most available jobs in the cloud.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. The better hire: the 50-year-old IT veteran or the fresh grad?
  2. iPhone 5 vs. the HTC One X+
  3. Facebook want button: Collecting massive amounts of data about you has never been easier
  4. 10 PC products that look like science fiction
  5. Microsoft: Users trying to get something for nothing wind up with malware
  6. A Linux user switches to DOS, Part 2
  7. .xxx to launch porn search engine
  8. How to set up a business-grade Wi-Fi network
  9. Cisco said to cut ties with China's ZTE
  10. '60 Minutes' torpedoes Huawei in less than 15 minutes
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: