Thursday, December 20, 2007

Google Toolbar flaw opens door for phishers; Cisco warns of firewall flaw; Microsoft IE work-around

Security Alert

Network World logo
NetworkWorld.com | Security Research Center | Update Your Profile
Google Toolbar flaw opens door for phishers

Robert McMillan By Robert McMillan
Google is working to fix a bug in the Google Toolbar that could allow criminals to steal data or install malicious software on a system, a security researcher warned Tuesday. Read full story

MORE STORIESARROW


SPONSORED BY NOKIA
rule

Executive Guide: Stay on Top of Wireless Tech
Wireless network technology developments move lighting fast in the enterprise. Get up to speed on the latest WLAN developments in technology, management and more with Network World's latest Executive Guide, "Keeping Up With the Wireless Whirlwind." Click here to download!

rule
RELATED NEWS:

Cisco warns of firewall flaw in its Catalyst switches, 7600 Series routers, 12/19/07 Cisco is warning that a flaw in its Firewall Services Module could result in a reload of the module, or if exploited repeatedly, could result in a sustained denial-of-service attack. (Also: read what the bloggers are saying.)

Microsoft offers work-around for IE security patch problems, 12/19/2007Microsoft has offered a technical work-around for Internet Explorer users who have found their browsers crashing after installing a recent set of ...

Orkut worm demonstrates vulnerability of service, 12/19/07 Google's Orkut social networking site appeared to have been hit by a relatively harmless worm, but one that demonstrated the continuing vulnerability of Web applications.

IE, Gmail bugs allow hijacking of accounts on public PCs, 12/18/07 Microsoft's Internet Explorer (IE) browser has an unpatched vulnerability that could let hackers hijack, then access, Google Inc. Gmail accounts, a California security company warned Monday.

Cisco: Vulnerabilities in '08 go beyond content security threats Cisco has published its first annual security report, which the vendor says goes beyond focusing on content security threats, such as viruses, worms and the like, but also discusses risk management categories, including vulnerability, physical, legal, trust, identity, human and geopolitical.

Valuable networking how-tos and hints and tips from our Cisco Subnet bloggers From advice on implementing IPv6, to protecting your network edge, to designing a network, to repairing a Cisco faceplate with easy-to-find items at your nearest hardware store, go here for a sampling of the easy-to-follow how-tos and implementation blog items written over the past year by Network World's growing group of Cisco Subnet bloggers.

How Fortinet and Cisco score when blocking spam? Competitive lab test pits Fortinet FortiMail-4000A against Cisco IronPort C350 e-mail security appliance.

Apple product security more flawed than Microsoft Side-by-side comparision of Apple and Microsoft security alerts of 2007 side-by-side show Apple had more than 5 times the number of flaws per month than Windows XP and Vista - and most of those flaws are serious.


THE FASTEST FIREWALLS
Clear Choice Test  Crossbeam, IBM win raw performance test; Juniper scores on price.

HOLIDAY GIFT GUIDE
2007 Cool Yule Tools - Holiday Gift Guide Find the very best tech holiday gift ideas.

SPONSORED BY NOKIA
rule

Executive Guide: Stay on Top of Wireless Tech
Wireless network technology developments move lighting fast in the enterprise. Get up to speed on the latest WLAN developments in technology, management and more with Network World's latest Executive Guide, "Keeping Up With the Wireless Whirlwind." Click here to download!

rule

Holiday Tech Toys
Stumped on what gadgets and gizmos to give this holiday? Have no fear, Cool Tools' Keith Shaw is here. We do all of the heavy lifting of wading through hundreds of submitted technology products to find the very best holiday gift ideas. Click here to view our holiday gift guide: http://www.nww.com/PSA2_1210

Featured reader resource

90% of IT Managers are leaving their company at risk for a DNS ATTACK. Get the tools and resources you need to keep your DNS healthy and secure. Run a DNSreport on your domain today - 56 critical tests run in 8 seconds.

Visit www.dnssfuff.com to learn more. (apply coupon NWW2007NLA for a 25% membership discount)

 

12/20/07

TODAY'S MOST-READ STORIES:

  1. How to really bury a mainframe
  2. BGP bug bites Juniper software
  3. 10 crazy USB stocking stuffers
  4. Xbox signal jamming WLANs
  5. 15 must-have Firefox tricks
  6. Feds are dropping the ball on IPv6
  7. Microsoft security update cripples IE
  8. Phone-record thieves laugh at the law
  9. Guru predicts last-minute IPv6 switch
  10. New Sprint chief Hesse faces a big inbox


TOP 100 OF 2007


Webcast: Beyond perimeter security

Listen to industry experts discuss the need for strong security throughout an IT environment. One expert says, the barbarians are not at the gate, they are already inside. Securing one access point to your network simply is not enough. Learn more today.

Access this webcast now.



IT Buyers guide

IT Buyer's Guides
Compare products, get advice, and check out tests and reviews from the experts at Network World. Over 70 categories. Visit now.

 


To continue receiving NetworkWorld's Security Alert newsletter, please add @nwfnews.com to your white list.

COMPLIMENTARY SUBSCRIPTIONS AVAILABLE
As a NW newsletter subscriber you are eligible to receive 50 issues of Network World Magazine, in print or electronic format, free of charge.

Sign up for your subscription today: Apply here. International subscribers,click here.

 

SUBSCRIPTION SERVICES
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Terms of Service/Privacy

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772
Copyright Network World, Inc., 2007

 

 



No comments:

Post a Comment