Search This Blog

Friday, March 14, 2014

IE zero-day flaw shows kinks in Microsoft patching

FISA court reverses order to destroy NSA phone data | Researchers pocket record $400K at Pwn2Own hacking contest's first day

Network World Security

Forward this to a Friend >>>


IE zero-day flaw shows kinks in Microsoft patching
The speed at which cybercriminals exploited an Internet Explorer vulnerability discovered in mid-February and finally patched Tuesday demonstrates the snags in Microsoft's security update system. Read More


WHITE PAPER: Neustar Inc.

Four Ways DNS Can Accelerate Business Growth
This e-book describes how DNS has developed over the years to support business growth as new needs have emerged, for example, advanced traffic management and protection from cyber threats. Learn More

RESOURCE COMPLIMENTS OF: SolarWinds

Tales from the Dark Side of the Network
Frustrated with your big IT Network Management System? In this exclusive footage, IT pros tell their side of the story...the dark side. Let SolarWinds ® Software bring light to the darkness. Save Time. Save Money. Save the Network with SolarWinds Network Performance Monitor. Watch now and don't let inefficient network management systems take your team to the dark side.

FISA court reverses order to destroy NSA phone data
The U.S. Foreign Intelligence Surveillance Court has temporarily reversed its earlier order that call records collected by the National Security Agency should be destroyed after the current five-year limit. Read More

Researchers pocket record $400K at Pwn2Own hacking contest's first day
Researchers cracked Microsoft's Internet Explorer 11, Mozilla's Firefox and Adobe's Flash and Reader at the Pwn2Own hacking contest, earning $400,000 in prizes, a one-day record for the challenge. Read More

Healthcare industry advised to do more thorough risk analyses
Healthcare organizations see an expanding landscape of uncertainty that has raised concerns among security pros and points to the need for more thorough threat analyses, a study showed. Read More


WEBCAST: IBM

Increasing the Value of Your Reports and Dashboards
Learn how incorporating other analytical capabilities such as predictive modeling and visualization can increase the value of your reports and dashboards by providing insight from complex data or predicting a future outcome. Register Now

Some Samsung Galaxy devices contain a file access backdoor, Replicant developers say
The developers of Replicant, a mobile OS based on Android, claim to have found a backdoor vulnerability in a software component shipped with some Samsung Galaxy devices that potentially provides remote access to users' private files through the device modem. Read More

Sophisticated scam targeting Verizon Wireless customers
The Better Business Bureau recently warned of a scam targeting Verizon Wireless customers that tries to trick users into giving up personal information. Read More

Twitter: Attack emails drop from 110 million per day to a few thousand
There used to be a whopping 110 million attack messages per day spoofing the Twitter domain name as cyber-criminals blasted out fake Twitter e-mail at intended victims to try and fool them into opening dangerous malware-infested links and other scams. But by adopting a messaging authentication protocol called Domain-based Message Authentication, Reporting and Conformance (DMARC), Twitter has seen that number drop to a few thousand. Read More


WHITE PAPER: Plantronics

Unleash your UC Potential By Putting Users First
What's holding back Unified Communications (UC) adoption? Too often, today's solutions are simply too hard to use. Now, survey results show high-quality audio and a simple and intuitive user experience can turbo-charge acceptance. Read this exclusive report from Plantronics and IDG to learn how you can start making the most of UC. Read now!

Can anti-virus technology morph into breach detection systems?
Anti-virus software is still often considered a "checkbox" item for enterprise deployments, especially on Microsoft Windows, but over the decades, anti-virus software changed to do far more than just signature-based virus blocking. Today, the question is whether the type of anti-malware product that evolved from virus checking can transform again to be a part of a "breach detection system," or BDS Read More

Mt. Gox kept exchange open despite knowledge of large-scale theft, filing suggests
Mt. Gox may have collected a large sum in trading fees in the weeks before its closure, even though it was already aware that a vast number of bitcoins had gone missing, its U.S. bankruptcy filing suggests. Read More

NASA radar system could help predict sinkholes
Read More


SLIDESHOWS

How to protect virtual machines (VMs)

These four products represent different approaches to VM security.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Embarrassing stories shed light on U.S. officials' technological ignorance

2. Why IBM thinks Windows Phone is best for the enterprise

3. Computer science enrollments rocketed last year, up 22%

4. The fascinating 50

5. Juniper Networks not giving up firewall patent fight vs. Palo Alto Networks

6. iPhone Air: Latest iPhone 6 concept video has fanboys fired up

7. Massive Bitcoin mining rig earns $8 million per month

8. Cisco shows Rob Ford no respect

9. March 2014 Patch Tuesday: Microsoft closes critical holes in IE, Windows

10. Cisco on mission to outfit all office rooms with video conferencing systems


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: