Friday, November 30, 2007

Government-sponsored cyberattacks on the rise; Q&A with warez site owner; Cisco confirms risk

Security Alert Network World logo
NetworkWorld.com | Security Research Center | Update Your Profile
Government-sponsored cyberattacks on the rise, McAfee says

Jon Brodkin By Jon Brodkin
Governments and allied groups worldwide are using the Internet to spy and launch cyberattacks on their enemies, targeting critical systems including electricity, air traffic control, financial markets and government computer networks. Read full story


SPONSORED BY TRIPWIRE
rule

Real-world change management
The key to change-management policies is the ability to enforce them in the real world. Discover the three steps to enforcing IT change management policies, how to measure policy-enforcement progress, how to create a zero-tolerance culture for unauthorized changes, and much more. Download this exclusive whitepaper today!

rule
RELATED NEWS:

11 questions for a warez site owner, 11/29/2007: You need a copy of Adobe's Photoshop or maybe the latest version of CorelDraw? Or how about downloading Beowulf or a DVD rip of American Gangster ...

Cisco confirms ability to eavesdrop on remote calls using its VoIP phones, 11/29/07: Cisco confirmed it is possible to eavesdrop on remote conversations using Cisco VoIP phones. In its security response, Cisco says: "an attacker with valid Extension Mobility authentication credentials could cause a Cisco Unified IP Phone configured to use the Extension Mobility feature to transmit or receive a Real-Time Transport Protocol (RTP) audio stream."

Google looks for help finding malicious Web sites, 11/30/2007: Google is asking everyday Web surfers to help with its efforts to stamp out malicious Web sites.. . The company has created an online form designed ...

FBI 'Bot Roast II: 1 million infected PCs, $20 million in losses and 8 indictments: The Federal Bureau of Investigation revealed the second phase of its Operation 'Bot Roast' netted eight individuals that have been indicted, pled guilty, or been sentenced for crimes related to botnet activity. Additionally, 13 search warrants were served in the U.S. and by overseas law enforcement partners in connection with the operation, the FBI said. This ongoing effort has thus far uncovered more than $20 million in economic loss and more than one million victim computers.

Spyware new champ among IT security worries: survey, 11/29/2007: Spyware leapfrogged ahead of viruses and worms to become the biggest security concern in 2007, according to survey results from the Computer ...

Police raid botmaster blamed for 1 million infections, 11/29/2007: Police have raided the home of the alleged ringleader of an international group of cybercriminals said to be responsible for infecting more than ...

Firefox gets security update, 11/29/2007: Mozilla was busy this week quashing a handful of bugs in its popular Firefox browser, while Microsoft won't confirm it is working on patching an ...

: Insider charged with hacking California canal system, 11/29/07: A former employee of a small California canal system has been charged with installing unauthorized software and damaging the computer used to divert water from the Sacramento River.

Free password generators, Part 3, 11/29/07: In the first two of this three-part series, I've been asking, "What's a good password?" and looking at password generators available free on the Web. This ...


HOLIDAY GIFT GUIDE
2007 Cool Yule Tools - Holiday Gift Guide Find the very best tech holiday gift ideas.

'07 ENTERPRISE ALL-STARS
'07 ENTERPRISE ALL-STARS Honoring outstanding technology projects.

SPONSORED BY TRIPWIRE
rule

Real-world change management
The key to change-management policies is the ability to enforce them in the real world. Discover the three steps to enforcing IT change management policies, how to measure policy-enforcement progress, how to create a zero-tolerance culture for unauthorized changes, and much more. Download this exclusive whitepaper today!

rule

Join Network World's Technology Opinion Panel
Here is your chance to help shape the future of IT. You know what products and enhancements are needed, you have the insight and foresight to be out front and provide direction to Network Word and the network industry. To join the panel, complete a brief registration survey
. The panel is strictly for technology professionals to share their vision.

Featured reader resource

90% of IT Managers are leaving their company at risk for a DNS ATTACK. Get the tools and resources you need to keep your DNS healthy and secure. Run a DNSreport on your domain today - 56 critical tests run in 8 seconds.

Visit www.dnsreport.com to learn more. (apply coupon NWW2007NLA for a 25% membership discount)

 

11/30/07

TODAY'S MOST-READ STORIES:

  1. 3.3 billion mobile accounts
  2. EFF fires at Internet traffic interference
  3. Open source's future
  4. Which certifications are worth your time?
  5. 2007 Cool Yule Tools Gift Guide
  6. First large-scale 802.11n WLAN working
  7. Teleworkers called back to cubicle life
  8. 2007 Enterprise All-Star Awards
  9. Testing all-in-one firewalls
  10. Lotus Notes vulnerable to e-mail attack

MOST DOWNLOADED PODCAST:
Streaming content to a desktop near you


Executive Guide The Security Treadmill

This Executive Guide offers interviews with leading, real-world security experts who tell you how to get inside users' heads, fight for a bigger security budget, and whether VoIP security issues are overstated or underrated, and much more. Review this informative guide today.

Click Here for More Information



IT Buyers guide

IT Buyer's Guides
Compare products, get advice, and check out tests and reviews from the experts at Network World. Over 70 categories. Visit now.

 


To continue receiving NetworkWorld's Security Alert newsletter, please add @nwfnews.com to your white list.

COMPLIMENTARY SUBSCRIPTIONS AVAILABLE
As a NW newsletter subscriber you are eligible to receive 50 issues of Network World Magazine, in print or electronic format, free of charge.

Sign up for your subscription today: Apply here. International subscribers,click here.

 

SUBSCRIPTION SERVICES
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Terms of Service/Privacy

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772
Copyright Network World, Inc., 2007

 

 



No comments:

Post a Comment