Search This Blog

Thursday, March 12, 2015

Windows PCs remained vulnerable to Stuxnet-like LNK attacks after 2010 patch

Hillary Clinton's email system was insecure for two months | Patch Tuesday: 5 of 14 rated Critical and Microsoft issues a fix for FREAK

Network World Microsoft

Windows PCs remained vulnerable to Stuxnet-like LNK attacks after 2010 patch
If you patched your Windows computers in 2010 against the LNK exploit used by Stuxnet and thought you were safe, researchers from Hewlett-Packard have some bad news for you: Microsoft's fix was flawed. Read More


WHITE PAPER: CDW

Mobile Expense Management: Picking up Money on the Ground
By any measure, the workplace is becoming increasingly mobile -- and not just in a telework, office-or-home way. More broadly, mobility is defined as computing that takes place anywhere at any time using smartphones and tablets, devices characterized by touch screens and wireless connectivity. Read Now

WHITE PAPER: CDW

Securing BYOD
Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are responding to the capabilities and flexibility that mobile devices provide. Read Now

Hillary Clinton's email system was insecure for two months
The private email system used by Hillary Clinton when she was U.S. Secretary of State didn't encrypt messages during the first two months of use, an Internet security company said Wednesday. That would have left emails sent and received by Clinton in early 2009 vulnerable to eavesdropping—just when British and American intelligence agencies were reportedly spying on world leaders. Read More

Patch Tuesday: 5 of 14 rated Critical and Microsoft issues a fix for FREAK
For March 2015 Patch Tuesday, Microsoft released 14 security bulletins resolving a plethora of security problems, five of which are rated critical, to fix flaws in Windows, Office, Exchange and, of course, Internet Explorer. Yes, Microsoft issued a FREAK fix, MS15-031 (see advisory), but rated it only as important. Read More

Windows systems are also vulnerable to FREAK attacks
A cryptographic library used in all Windows versions is affected by a recently disclosed vulnerability in SSL/TLS implementations that allows man-in-the-middle attackers to force clients and servers to use weak encryption. Internet Explorer and other programs using the library are affected.T Read More


WHITE PAPER: CDW

Partners in Mobile Device Management: AirWatch & CDW
When it comes to Mobile Device Management, it's not just what you know. It's who you know. That's why CDW partners with industry leaders like AirWatch. Their comprehensive mobile device management (MDM) solutions give you visibility and control over a variety of device models, platforms and operating systems. View Now

Review: Microsoft Azure beats Amazon and Google for mobile development
In the last year I've reviewed six MBaaS (mobile back end as a service) platforms: FeedHenry, Kinvey, Parse, AnyPresence, Appcelerator, and Appery.io. I also briefly examined the MBaaS platforms associated with Pivotal CF and IBM Bluemix in my reviews of those PaaS (platform as a service) offerings. All of these MBaaS platforms run on some kind of public cloud, and some can be installed on-premise or in hybrid cloud configurations. Read More

Juniper rewires the data center
Juniper Networks this week rolled out new data center switches to help customers address opportunities and challenges presented by cloud computing. Read More

Microsoft reportedly prepping a tiny version of Windows Server
As Microsoft prepares for Windows Server vNext, due next year, it also has a new, tiny footprint server in the works specifically for the cloud and designed to reduce problems with the standard server version. Read More


WHITE PAPER: CDW

The Case for Mobile Apps
Today's mobile apps turn handheld devices into e-book readers, portable navigation systems, digital wallets and more. And for organizations with mobile workers, they boost productivity by allowing easy access to resources and applications. Mobile apps can be designed for employees, customers, constituents and more. Read Now

How cloud-based ERP can give your business a boost
A couple of years ago, Unionwear, a clothing and accessaries manufacturer-based in Newark, N.J., employed a patchwork of systems to run its business. Unionwear, a 120-employee company, lacked a unified, enterprise-wide system. Read More

Google is developing a virtual reality version of Android, report says
Google is reportedly developing a virtual reality version of Android that will compete with software being built by Facebook, Samsung, Microsoft and others. Read More

Microsoft asks US court to ban Kyocera's Android phones
Microsoft has asked a court in Seattle to ban Kyocera's DuraForce, Hydro and Brigadier lines of cellular phones in the U.S., alleging that they infringed seven Microsoft patents. Read More


SLIDESHOWS

Apple's most important announcements at its Apple Watch event

At an event to launch the Apple Watch, Apple also made several announcements regarding Apple TV, HBO, Macbook, and other products.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 10 young security companies to watch in 2015

2. March 2015 Patch Tuesday: 5 of 14 rated Critical

3. Kaspersky: 'A very bad incident' awaits critical infrastructure

4. 28 facts about pi that you probably didn't know

5. Shortage of security pros worsens

6. Blue Coat Systems gets flipped for $2.4 billion

7. 8 free Wi-Fi stumbling and surveying tools

8. Six entry-level cybersecurity job seeker failings

9. 7 warning signs an employee has gone rogue

10. Apple Watch: An overpriced, out-of-date status symbol


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_microsoft_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: