Search This Blog

Monday, February 11, 2013

Internet Explorer flaws fixed by Microsoft Patch Tuesday updates

  Google, Microsoft and others putting kibosh on phishing emails | Banking malware returns to basics to evade detection, Trusteer says
 
  Network World Security

Forward this to a Friend >>>


Internet Explorer flaws fixed by Microsoft Patch Tuesday updates
Microsoft says Internet Explorer versions 6 through 10 are subjects of two critical Patch Tuesday updates for February that could address recent Java woes. Read More


WEBCAST: HP

Determine Your Cloud Storage Readiness
Cloud will impact your storage environment. Hear what a HP Storage expert has to say. View Now!

WHITE PAPER: Symantec

Is Online Backup Right For Your Business?
Read this whitepaper to find out how cloud-based hybrid backup offers significant cost savings, to small and medium-size businesses, as well as flexible options designed for agility, and a workforce that is free to focus on the company's core offering. Read Now!

Google, Microsoft and others putting kibosh on phishing emails
A year after Google, Microsoft and other email heavyweights launched the DMARC program to filter out spoofed email that attackers use for phishing, they say an estimated 60% of the world's email boxes are now safe. Read More

Banking malware returns to basics to evade detection, Trusteer says
Financial malware authors are trying to evade new online banking security systems by returning to more traditional phishing-like credential stealing techniques, according to researchers from security firm Trusteer. Read More

Fed stays secretive after Anonymous hack
U.S. government officials regularly claim they want voluntary, substantive sharing between the public and private sectors on cyberattacks, vulnerabilities and breaches. Given that, the Fed is not on message following a Super Bowl Sunday hack. Read More


WHITE PAPER: HP

Providing Security for Software Systems in the Cloud
The software industry has learned that putting fancy boxes on the network doesn't fix bad software, cloud converts must focus on the risks they bring along with the software they deploy. This paper details risks to software deployed in the cloud and what steps to take to mitigate that risk. Learn more.

What can L2TP do for your network?
The Layer 2 Tunneling Protocol (L2TP) is a standard protocol for tunneling L2 traffic over an IP network. Its ability to carry almost any L2 data format over IP or other L3 networks makes it particularly useful. But L2TP remains little-known outside of certain niches, perhaps because early versions of the specification were limited to carrying PPP -- a limitation that is now removed. Read More

Automate security orchestration across platforms, environments
IT security professionals sometimes have a tough choice: put reins on the business until all necessary security controls are in place, or let the business run at the pace it wants with security controls that may have weaknesses or gaps? A new security orchestration platform from NetCitadel aims to resolve that conflict by automating security changes across multiple platforms and within physical, virtual and cloud environments. Read More

Bamital botnet take-down scores a first as Microsoft notifies infected victims
For the first time, a major botnet take-down has included direct victim notification that warns users their PCs are infected and shows them how to scrub clean their machines. Read More


WHITE PAPER: F5

Vital Security Strategies for Microsoft Exchange
The demand for access to email anytime, anywhere, from any device makes it critical for IT to ensure Microsoft Exchange deployments are secure, fast, and available. Learn about vital security requirements every Exchange environment should have in place to improve security and availability for Exchange. Read Now.

Researchers devise new attack techniques against SSL
The developers of many SSL libraries are releasing patches for a vulnerability that could potentially be exploited to recover plaintext information, such as browser authentication cookies, from encrypted communications. Read More

Is Stolen IP Walking in the Door With New Employees?
Are your former employees walking out the door with your intellectual property? And worse, is your new hire putting your organization at risk by bringing in IP stolen from a former employer? A new global survey by Symantec and The Ponemon Institute finds that half of employees who left or lost their jobs in the past 12 months kept confidential corporate data, and 40 percent say they plan to use the data in their new jobs. Read More

What Bush email hacker faces: The Palin Precedent
A year behind bars: That's what David Kernell received for guessing his way into the private email account of vice presidential candidate Sarah Palin in 2008. So that would certainly be the starting point for penalties due the perpetrator of this latest invasion of privacy against the politically powerful. Read More

ACLU takes wireless carriers to task for poor Android security
The American Civil Liberties Union has called on wireless carriers to either take responsibility for Android security on the mobile devices they sell or let Google handle updates to protect the millions of people using the operating system. Read More

Google Offers Security Tips for Safer Internet
Search giant joins groups to promote online safety to mark Safer Internet Day, the National Cyber Security Alliance's annual day of observance. Read More

 
 
 

SLIDESHOWS

2013's 25 Geekiest 25th Anniversaries

A look back at the most memorable tech-related happenings of 1988.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 25 techie Valentine's Day gift ideas

2. Another new release date for Galaxy S 4, but is Samsung battening down the hatches?

3. Cisco vs. Juniper: How different are their SDN strategies?

4. iPad 5 rumor rollup for the week ending Feb. 6

5. Juniper bolsters security assets with $10M buyout of anti-DDoS firm

6. A giant radio telescope, a small school and Wi-Fi problem

7. iPhoneys: The iPhone 6 and iPhone 5S edition

8. Cycle Computing spins up 10,600 instances in Amazon's cloud

9. Microsoft hints at Surface Pro keyboard that powers Windows 8 computer

10. Leaked Chromebook video raises questions beginning with: Is it real?

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: