Tuesday, July 31, 2007

Tool tests for phishing-attack gullibility; Botnets identified and blocked with new hosted service

Network World

Security News Alert




Network World's Security News Alert, 07/31/07

Tool tests for phishing-attack gullibility, 07/30/07: Do your company’s employees seem like easy dupes for e-mail phishing attacks and other scams? A vulnerability-assessment tool from Core Security Technologies lets you set up automated tests to find out.

Botnets identified and blocked with new hosted service, 07/30/07: A security tool that identifies botnets and blocks attacks from these zombie networks is being made available by Trend Micro online in the software-as-a-service model.

Nevis NAC gear introduces cloaking, 07/30/07: Nevis Networks has new software that makes it easier for its NAC hardware to block any user on a network from seeing another device, making it possible to prevent rogue equipment or malicious users from accessing resources they shouldn’t or from probing the network for vulnerabilities.

Network World Security Buyer's Guide

Find the right security products for your enterprise - fast. From anti-spam to wireless LAN security, our Buyer's Guides have detailed information on hundreds of products in more than 20 categories. With the side-by-side comparison tool you can evaluate product features to make the best decision for your enterprise.

Click here to go to the Security Buyer's Guide now.

Single group behind ransomware Trojans, 07/30/07: The two most prominent ransomware Trojans of recent times could be the work of the same people, or a related group of criminals, an analysis has suggested.

E-mail scams target deep-pocketed victims, 07/27/07: A wave of sophisticated, ongoing attacks disguised as bills from supposed business partners, complaints from the Better Business Bureau, and investigations by the U.S. Internal Revenue Service is snaring high-value business victims with malware-carrying e-mail messages that don't bear the usual telltale signs of phishing.

California report slams e-voting system security, 07/27/07: Researchers commissioned by the State of California have found security issues in every electronic voting system they tested, California Secretary of State Debra Bowen said Friday.

Microsoft Subnet blogger, Tyson Kopczynski, delves into the mysteries of Microsoft’s Certificate Lifecycle Manager. “Overall, I like CLM,” he reports, though he also has misgivings.

TODAY'S MOST-READ STORIES:

1. Online gamers’ dirty little secrets exposed
2. IBM tells employees to behave in Second Life
3. Video games televised as a sport?
4. NAC alternatives hit the mark
5. Hogwarts IT director quits
6. Akonix: IM attacks up nearly 80%
7. Cisco Networkers extravaganza highlights
8. Top 15 'networkiest' moments of The Simpsons
9. Industry giants get 'Simpsonized'
10. Nacchio sentenced to 6 years, $52M fine

MOST-READ REVIEW:
NAC alternatives hit the mark


Contact the author:

Senior Editor Ellen Messmer covers security for Network World. E-mail Ellen.



BONUS FEATURE

IT PRODUCT RESEARCH AT YOUR FINGERTIPS

Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details.


PRINT SUBSCRIPTIONS AVAILABLE
You've got the technology snapshot of your choice delivered to your inbox each day. Extend your knowledge with a print subscription to the Network World newsweekly, Apply here today.

International subscribers, click here.


SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription.


Advertising information: Write to Associate Publisher Online Susan Cardoza

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772

Copyright Network World, Inc., 2007

No comments:

Post a Comment