Search This Blog

Wednesday, October 09, 2013

Microsoft finally patches gaping IE exploit with Patch Tuesday update

Network World Security - Newsletter - networkworld.com
  SDN: The security pros and cons of using it in your organization | Gartner: The Top 10 IT altering predictions for 2014

 
  Network World Security

Forward this to a Friend >>>


Microsoft finally patches gaping IE exploit with Patch Tuesday update
  For the last decade, admins have awaited Microsoft Patch Tuesday with dread - or perhaps delight, but that seems highly doubtful. There's no time to delay when it comes to patching this month, however, as Microsoft finally closed the gaping zero-day hole in IE that is being actively exploited in the wild by cyber crooks, nation-state hackers and pen testers. Read More
 




RESOURCE COMPLIMENTS OF: CITE Conference

Your pad or mine? BYOD is changing everything.
Tablets and mobile devices are driving a BYOD revolution in the enterprise. Come to Consumerization of IT in the Enterprise One-Day Forum(CITE) November 5, 2013 in New York City and learn how top IT leaders have made it work for them…and how you can, too. Learn more

 

INSIDER
SDN: The security pros and cons of using it in your organization
SDN benefits include automating and easing network administration duties and improving application performance. But it also introduces a number of potential threat vectors into your environment. What should you know before you invest in SDN? Read More

 

Gartner: The Top 10 IT altering predictions for 2014
Gartner analysts today whipped out their always interesting and sometimes controversial look at what the consultancy thinks will impact the IT arena in the near future. Read More
 


WHITE PAPER: AT&T

How to navigate the ever-changing mobile device landscape
Smartphones, tablets, social networks, and cloud services are all popular, incredibly useful, and a security risk. These days, the security focus is on mobile devices, as they tend to be used a lot to work with corporate information. Learn More

Reflecting on 10 years of Microsoft's Patch Tuesday
Today marks the 10th anniversary of the debut of Microsoft's Patch Tuesday program, through which it would regularly issue fixes to its software on the second Tuesday of every month. It had been possible to check for updates via the Windows Update application in Windows XP, but now Microsoft was actually going to push out fixes. Read More
 

The toll of enterprise cybercrime: $11.8 million per year ; 122 attacks per week
  A survey of 60 companies in the U.S. about the impact of cybercrime indicates that the annualized cost of dealing with cyberattacks of all kinds is now $11.6 million per year on average, up from $8.9 million last year. Read More
 


WHITE PAPER: New Relic

Secure, Reliable & Proven APM for the Enterprise
  Your organization depends on your web applications to do business -- from customer facing eCommerce,banking or travel applications, to mission-critical applications for your employees or partners. When it comes to performance, visitors' expectations for service and reliability are high. Read Now

Three indicted in alleged source code theft from trading house
  Two former traders and a third man have been indicted in New York State Supreme Court for allegedly stealing source code and trading strategy files from a brokerage company with headquarters in the Netherlands. Read More
 

Blackhole exploit kit author arrested in Russia
Russian authorities have arrested the main developer of the notorious Blackhole exploit kit, one of the most popular attack tools used to infect Web users with malware. Read More
 

Wireless carriers need to make changes to combat SIM-card fraud
  U.S. carriers will need to adjust security tactics soon to combat an emerging threat in which criminals hijack SIM cards used to authenticate mobile phone customers on wireless networks, experts say. Read More
 

Symantec uses vulnerability to take out part of the ZeroAccess botnet
Symantec has announced that they've successfully taken down a significant part of the ZeroAccess botnet, by exploiting a weakness discovered in its code. Read More
 

 

SLIDESHOWS

The 'Bad Boys' of open source

The open source world's most notorious characters.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Gartner: top 10 future strategic IT predictions

2. 802.11ac 'gigabit Wi-Fi' starts to show potential, limits

3. 5 Wi-Fi security myths you must abandon now

4. Mystery solved: This 'thing' is a ...

5. IT shops share OpenFlow, SDN best practices

6. 25 tips and tools to make Google Drive better

7. iPhone 6 rumor rollup for the week ending Oct. 6

8. BlackBerry offers itself up to six would-be buyers; Cisco looks like the best fit

9. Report: FBI can't access Silk Road owner's $80 million in Bitcoins

10. Study: Most CEOs lack vision, leadership on new computer tech


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments: