Friday, June 01, 2007

Google Desktop vulnerable to new attack; Who's really behind the cyber-war on Estonia?

Network World

Security News Alert




Network World's Security News Alert, 06/01/07

Google Desktop vulnerable to new attack, 06/01/07:  Just one day after a security researcher showed how Google's Firefox toolbar could be exploited in an online attack, a similar flaw has been discovered in the Google Desktop. Click here for more.

Who's really behind the cyber-war on Estonia?, 05/31/07:  Network World Senior Editor Ellen Messmer ponders whether Estonia is under attack by the Russian government or Russian hackers - or whether it matters. Click here for more.

Security flap: 'Responsible disclosure' debate flares anew, 05/31/07:  When a recent hacking contest won security researcher Dino Dai Zovi a $10,000 award for breaking into a MacBook Pro computer by exploiting a flaw he’d discovered, the contest reignited a long-simmering debate over “responsible disclosure” of vulnerabilities. Click here for more.

From servers to storage: Virtualization saves

It's touted as one of the fastest and easiest ways to better manage and control your infrastructure. Download this guide today and see how network IT execs are making virtualization pay off in the real world; discover the 8 virtualization gotchas you need to know; and much more.
Click here to download.

New Hampshire officials say no to Real ID, 05/30/07:  New Hampshire is poised to become the latest of a handful of states to enact a law to ban implementation of the federal national identification act. Click here for more.

Prepare for more mobile security threats now, 05/30/07:  Mobile security threats are a relatively minor annoyance to a handful of users in Europe and Asia. However, conditions are rapidly ripening for these threats to start overwhelming both companies and individual users in North America. Click here for more.

How can Brandjacking threaten your company?, 05/31/07:  Bad guys aren't just going after your data and networks, they're going after your company's brand as well. Learn about the latest brandjacking threats from Fred Felman (pictured) of MarkMonitor, which recently released its Brandjacking Index of the latest online threats to brand names. Felman talks with Keith Shaw about cyber-squatting, false association, pay-per-click abuse and domain kiting (23:49). Listen now.

TODAY'S MOST-READ STORIES:

1. Researcher: Don't trust Google Toolbar
2. Google makes Web applications work offline
3. Michigan man fined for using free Wi-Fi
4. IBM lays off 1,500, mostly in services
5. FiOS TV? Maybe Verizon ought to stick to phones
6. Novell: Microsoft deal good for Linux business
7. Verizon planning iPhone killer
8. RPalm set to unveil 'smart phone companion'
9. 'Spam king' arrested in Seattle
10. ITIL V3 goes live

MOST DOWNLOADED PODCAST:
Twisted Pair: No lonely cowboys at Interop 2007


Contact the author:

Senior Editor Ellen Messmer covers security for Network World. E-mail Ellen.



BONUS FEATURE

IT PRODUCT RESEARCH AT YOUR FINGERTIPS

Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details.


PRINT SUBSCRIPTIONS AVAILABLE
You've got the technology snapshot of your choice delivered to your inbox each day. Extend your knowledge with a print subscription to the Network World newsweekly, Apply here today.

International subscribers, click here.


SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription.


Advertising information: Write to Associate Publisher Online Susan Cardoza

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772

Copyright Network World, Inc., 2007

No comments:

Post a Comment