Friday, July 27, 2007

Classified U.S. military info available over P2P; A rush to patch iPhone

Network World

Security News Alert




Network World's Security News Alert, 07/27/07

Classified U.S. military info available over P2P, 07/25/07: Millions of documents, both government and private, containing sensitive and sometimes classified information are floating about freely on file sharing networks after being inadvertently exposed by individuals downloading P2P software on systems that held the data, members of a U.S. House committee were told Tuesday.

Why we're losing the botnet battle, 07/25/07: Botnets -- they're dangerous, deceptive, and very difficult to detect and deal with. What's more, according to recent surveys, the botnet threat is growing...rapidly.

With Black Hat approaching, a rush to patch iPhone, 07/27/07: With security researchers set to reveal details of a critical security flaw in the iPhone at the Black Hat 2007 conference next week, Apple now has fewer than seven days to patch a critical vulnerability in the product.

Network World Security Buyers Guide

Find the right security products for your enterprise - fast. From anti-spam to wireless LAN security, our Buyers Guides have detailed information on hundreds of products in more than 20 categories. With the side-by-side comparison tool you can evaluate product features to make the best decision for your enterprise.

Click here to go to the Security Buyers Guide now.

Aruba, Alcatel-Lucent deepen mobility partnership, 07/26/07: Alcatel-Lucent plans to extend enterprise security into cellular networks through its own fixed-mobile convergence systems and Aruba's "follow-me" security technology as part of a planned joint venture.

Slamming the company door on porn, 07/25/07: Your organization's next e-mail filtering software may come equipped with a blocking component that prevents pornographic content from entering the corporate network.

Study: Largest vendors account for fewer software flaws, 07/25/07: The top 10 most vulnerable software vendors are contributing a smaller percentage of all vulnerability disclosures per year compared to five years ago, a study by IBM's Internet Security Systems X-Force team has found.

USB device uses image analysis to scan for inappropriate images, 07/25/07: The USB device includes detection software that uses image-analysis algorithms to scan a notebook or desktop for potentially inappropriate images or Web pages.

Video: A dirty job for IT: Keith test-drives a USB device with file detection software that aims to find objectionable content stored on a PC notebook.

Enterprise-level security for small businesses, 07/25/07: If you run a small business, you've probably often wished you had the resources that the big guys do when it comes to implementing new technology--especially if that technology can help secure your data. Recently, Postini announced that it will begin offering services to companies with 5 to 250 employees. Its service filters e-mail to weed out viruses, worms, and other threats; it either eliminates suspicious messages or moves them into quarantine, and alerts the user.

TODAY'S MOST-READ STORIES:

1. Sand, sun and RFID?
2. Hogwarts IT director quits
3. Cisco clarifies software opportunity
4. Free security tool ferrets out unpatched software
5. 12 IT skills that employers can't say no to
6. Cisco outlines fix for ARP storms on WLANs
7. How rumors get started and spread
8. China's mobile market explodes
9. Serious hole in BIND 9 DNS server
10. 11 corporate anthems to die for

MOST DOWNLOADED PODCAST:
Twisted Pair Podcast: Hype Wars - iPhone vs. Harry Potter


Contact the author:

Senior Editor Ellen Messmer covers security for Network World. E-mail Ellen.



BONUS FEATURE

IT PRODUCT RESEARCH AT YOUR FINGERTIPS

Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details.


PRINT SUBSCRIPTIONS AVAILABLE
You've got the technology snapshot of your choice delivered to your inbox each day. Extend your knowledge with a print subscription to the Network World newsweekly, Apply here today.

International subscribers, click here.


SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription.


Advertising information: Write to Associate Publisher Online Susan Cardoza

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772

Copyright Network World, Inc., 2007

No comments:

Post a Comment