Virus and Bug Patch AlertThis newsletter is sponsored by Arsenal Digital SolutionsNetwork World's Virus and Bug Patch Alert Newsletter, 07/05/07Apple patches audio bugBy Jason MeserveToday's bug patches and security alerts: Apple Monday issued a fix for the "snap, crackle, pop" audio problem that has bedeviled some Macintosh users since the June 20 operating system update to Mac OS 10.4.10. Tagged as "Audio Update 2007-001," the 660KB download targets all Intel-powered Macs, said Apple. "[This] addresses an issue with version 1.0 of the Mac OS X 10.4.10 Update in which a 'popping' sound might be heard with some external speakers on Intel-based Macs," said Apple in the update's online notice. Macs equipped with the older PowerPC processors don't need to install this update, Apple said. Computerworld, 07/02/07.
********** Three new updates from Gentoo: Firebird (buffer overflow, code execution) OpenOffice.org (multiple flaws) GNU C Library (integer overflow, code execution) ********** Three new updates from Debian: fireflier-server (non-secure temp files) gsambad (non-secure temp files, code execution) unicon-imc2 (buffer overflow, code execution) ********** Today's malware news: IPhone scams ramp up, target overeager buyers Using the buzz surrounding last Friday's launch of the iPhone, hackers and scammers are targeting eager would-be buyers to launch their latest attacks. Computerworld, 07/04/07. 4th of July and Greeting Cards As today is the 4th of July - Independence Day in the United States, it wasn't a big surprise that there has been lots of malicious 4th of July greeting cards going around. They work exactly the same way as the other greeting cards and the ones we've seen have all been using IP addresses for the clickable link. Again, stay away from them. F-Secure blog, 07/04/07. When Spambots Attack -- Each Other! So, you've read plenty about when botnets attack. You've also seen plenty about when spambots attack, though it's usually only in the form of spam email flooding in the course of spambot offspring performing the functions for which their creator intended. There's even been plenty of press about when Botnets Battle Over Turf, attacking each other. So, let's delve into one example of why that is, and take a terse look at one such set of attacks. Security to the Core blog, 07/01/07. ********** From the interesting reading department: Is securing your network worth the money? Security researchers detail P2P threats, vulnerability disclosures and hacker profiling at recent Carnegie Mellon confab. NetworkWorld.com, 07/03/07. Fidelity National: Ex-worker stole 2.3 million customer records Fidelity National Information Services, a financial-processing company, said today a senior-level database administrator at one of its subsidiaries stole 2.3 million consumer records containing credit card, bank account and other personal information. Network World, 07/03/07. Organized, financially driven online criminals a main corporate threat, IBM security exec says Director of IBM Internet Security Systems Kris Lamb says online criminals are focusing on highly repeatable, highly undetectable types of attacks using bots and malware. NetworkWorld.com, 07/03/07. 15 great, free security programs From the moment you switch on your PC, your system faces countless Internet-borne dangers, including spyware attacks, viruses, Trojan horses, home-page hijackers, and hackers trying to weasel their way into your system. And the Internet isn't the only source of trouble. Anyone with access to your PC can invade your privacy by prying into which Web sites you visit--and learning a great deal more as well. PC World, 07/02/07. Consumer devices pose threat to enterprise security As more consumer technologies make their way to the enterprise, Gartner advises IT leaders to prepare to manage the additional security risks. Your security managers should consider deploying network access control (NAC) or content management filtering (CMF)/data loss prevention (DLP) to minimize threats. Network World, 07/03/07. Hackers target C-level execs and their families Hackers appear to have stepped up their efforts to trick corporate executives into downloading malicious software programs that can steal company data over the past year, according to new data released Monday. IDG News Service, 07/02/07. Salary survey: Be a CSO and get rich CSOs are seeing the most significant increases in pay this year, while IT professionals in general are experiencing minor increases in compensation, according to a new survey. NetworkWorld.com, 07/02/07. Opinion: An invisible abomination ISPs spying on customers’ Internet activities, inserting ads in Web pages. Network World, 07/02/07.
|
Contact the author: Jason Meserve is Network World's Multimedia Editor and writes about streaming media, search engines and IP Multicast. Check out his Multimedia Exchange Weblog. Check out Jason Meserve and Keith Shaw's weekly podcast "Twisted Pair" This newsletter is sponsored by Arsenal Digital SolutionsARCHIVEArchive of the Virus and Bug Patch Alert Newsletter. BONUS FEATUREIT PRODUCT RESEARCH AT YOUR FINGERTIPS Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details. PRINT SUBSCRIPTIONS AVAILABLE International subscribers, click here. SUBSCRIPTION SERVICESTo subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here. This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription. Advertising information: Write to Associate Publisher Online Susan Cardoza Network World, Inc., 118 Turnpike Road, Southborough, MA 01772 Copyright Network World, Inc., 2007 |
No comments:
Post a Comment