Monday, November 19, 2007

Patches from Apple, Ubuntu and Mandriva

Security: Threat Alert Network World logo
NetworkWorld.com | Security Research Center | Update Your Profile
Patches from Apple, Ubuntu and Mandriva

Jason Meserve By Jason Meserve
Apple issues Panther security patch Mac OS X 10.3.9 Panther users also came in for a software update from Apple Wednesday night, in the form of the latest security update for the systems. Read full story

Jason Meserve is Network World's Multimedia Editor and writes about streaming media, search engines and IP Multicast. Check out his Multimedia Exchange Weblog.

Check out Jason Meserve and Keith Shaw's weekly podcast "Twisted Pair"


SPONSORED BY AWARENESS TECHNOLOGIES INC.
rule

Discover the Benefits of Desktop Agents
Learn how you can better protect your network from off-net, insider threats with desktop agents. Find out how this security technology allows IT managers to monitor and archive all communication and keystrokes on end-user laptops. Discover more benefits today. Download this whitepaper now.

rule
RELATED NEWS:

From the interesting reading department:

Microsoft DNS bug long-known, familiar to researchers
The DNS cache poisoning bug that Microsoft patched last Tuesday stems from a flaw that has been known to researchers for 10 years or more, the two security firms credited with reporting the vulnerability said this week. Computerworld, 11/17/07.

Hackers target MLB, NHL sites
Hackers targeted the Major League Baseball and National Hockey League Web sites last week with an exploit that convinces users they need to scan their computer for viruses and tricks them into downloading a malicious program. Network World, 11/14/07.

Researchers eye open proxy attacks
Advertising and click-through fraud is currently topping the list of malicious activity funneled through open proxy servers, followed by junk e-mail, according to a research project deploying fake open proxies to catch crooks. TechWorld, 11/15/07.

LAN switch security: what the hackers know that you don't
Author experts explain how to thwart ARP spoofing, ARP poisoning, P2P traffic, wireless LAN threats and more during a live Network World Chat. Network World, 11/15/07.

With Web 2.0, a new breed of malware evolves
Web 2.0 technologies may be laying the groundwork for a new generation of hacker tools, a noted security researcher said Wednesday. IDG News Service, 11/14/07.

Expect a rocky road for mobile data security, experts say
You're in for a nasty surprise if you think mobile broadband devices will be free of the security problems that long have plagued PCs, said a panel of security experts at this week's Mobile Internet World conference. Network World, 11/15/07.

Virtualization, online games, Web 2.0 top security risks, McAfee says
In its "Top Ten Security Predictions for 2008," McAfee foresees the growth of virtualization opening up a huge attack surface. On the good-news side, the security vendor expects there will be less adware on the Internet to worry about. Network World, 11/15/07.

Telcos lack security plans for next-gen networks, says IBM survey
While a majority of carriers plan on rolling out next-generation network architecture in the next five years, less than half of them say they have strategies in place to protect their NGNs, according to a new IBM survey. Network World, 11/15/07.

Virtual Theft at the Habbo Hotel
Habbo Hotel is a virtual community aimed at teenagers that's part chat room and part online game. It's the property of Helsinki based Sulake Corporation. The BBC is reporting that six Dutch teenagers are allegedly involved in the theft of 4000 euros worth of virtual furniture. F-Secure Antivirus Research blog, 11/15/07.

Montana State University reports three data breaches in single day
Think disclosing one data breach is hard enough? Try having to disclose three at the same time. That's precisely what the State University of Montana had to do recently when it discovered three separate incidents involving the potential compromise of personal data on the same day. Computerworld, 11/15/07.


BIG THREATS IN '08
Top 5 security threats in 2008Top 5 security-menace predictions for next year.

ALL-IN-ONE FIREWALL TEST
idemandJuniper, Check Point, Cisco lead way in test of 13 UTM devices.

SPONSORED BY AWARENESS TECHNOLOGIES INC.
rule

Discover the Benefits of Desktop Agents
Learn how you can better protect your network from off-net, insider threats with desktop agents. Find out how this security technology allows IT managers to monitor and archive all communication and keystrokes on end-user laptops. Discover more benefits today. Download this whitepaper now.

rule

Join Network World's Technology Opinion Panel
Here is your chance to help shape the future of IT. You know what products and enhancements are needed, you have the insight and foresight to be out front and provide direction to Network Word and the network industry. To join the panel, complete a brief registration survey
. The panel is strictly for technology professionals to share their vision.

Featured reader resource

90% of IT Managers are leaving their company at risk for a DNS ATTACK. Get the tools and resources you need to keep your DNS healthy and secure. Run a DNSreport on your domain today - 56 critical tests run in 8 seconds.

Visit www.dnsreport.com to learn more. (apply coupon NWW2007NLA for a 25% membership discount)

 

11/19/07

TODAY'S MOST-READ STORIES:

  1. Holmes Comet grows bigger than the sun
  2. Disappearing Gmail messages baffle users
  3. Microsoft wins boot-up patent suit
  4. Processing, a language for visual output
  5. Testing all-in-one firewalls
  6. What hackers know about LAN switches
  7. Greatest hits of viral video
  8. 10 career killers to avoid
  9. Latest e-mail scam targets executives
  10. Relax T-Day fliers: Bush has your back

FEATURED BUYER'S GUIDE:
Wireless LAN Security


Executive Guide The Security Treadmill

This Executive Guide offers interviews with leading, real-world security experts who tell you how to get inside users heads, fight for a bigger security budget, and whether VoIP security issues are overstated or underrated, and much more. Review this informative guide today.

Click Here for More Information



IT Buyers guide

IT Buyer's Guides
Compare products, get advice, and check out tests and reviews from the experts at Network World. Over 70 categories. Visit now.

 


To continue receiving NetworkWorld's Security: Threat Alert newsletter, please add @nwfnews.com to your white list.

COMPLIMENTARY SUBSCRIPTIONS AVAILABLE
As a NW newsletter subscriber you are eligible to receive 50 issues of Network World Magazine, in print or electronic format, free of charge.

Sign up for your subscription today: Apply here. International subscribers,click here.

 

SUBSCRIPTION SERVICES
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Terms of Service/Privacy

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772
Copyright Network World, Inc., 2007

 

 



No comments:

Post a Comment