Friday, December 21, 2007

Trojan bumps Google ads from Web pages; Security: What will be hot in 2008?

Security Alert

Network World logo
NetworkWorld.com | Security Research Center | Update Your Profile
Trojan bumps Google ads from Web pages

By Jeremy Kirk
A security company has identified a Trojan horse program that replaces Google text advertisements on Web pages with ads from another source, depriving Google of revenue and potentially causing problems for end users. Read full story

MORE STORIESARROW


SPONSORED BY SHUNRA
rule

Get More From Your WAN
Download the latest Network World Executive Guide and get eight case studies that detail how real-world organizations are employing cutting-edge technologies to optimize their WAN. Learn about trunk expansion, MPLS and Metro Ethernet, and also get the latest testing and research the Network World Lab Alliance.

rule
RELATED NEWS:

Security: What will be hot in 2008?, 12/19/07 There are two ways to predict the future with 100% accuracy. You either have the power to shape the future to your predictions (the God method) or you make your predictions vague enough so that they fit most conceivable outcomes (the Nostradamus ...

EU data protection chief questions passenger records plan, 12/20/07 Europe's top data protection official, European Data Protection Supervisor Peter Hustinx, criticized plans to create a European equivalent of the passenger name records (PNR) gathered by U.S. authorities, questioning the plan's necessity and proportionality.

Websense touts data-leak prevention endpoint control, 12/20/07 Websense says it will release an endpoint security product for content protection in the first half of next year, along with an extended set ...

Cisco Subnet's top Cisco lists Quiz: How much do you know about Cisco?; Cisco Subnet's top 10 of 2007; 7 Cisco bad luck happenings in '07: Top 6 Cisco acquisitions of 2007 and what it should buy in 2008; Valuable networking how-tos and hints and tips from our Cisco Subnet bloggers.

Podcast: Even Dilbert can't stop the snow Jason and Keith end the year talking about Google's security woes, whether they are suffering from information overload, and why they need to take down their Dilbert cartoons posted on their office doors.

All-in-one security suites: Tried and tested, 12/20/2007 Today's security suites have a difficult job. Every other day seems to bring a new threat that targets Windows PCs. Spam is going through the roof ...

Howard Schmidt patrols cyberspace, 12/20/2007 Sometimes a person's biography alone is grounds for reading whatever they write. I've got a specific case for you.. . Howard Schmidt, CISSP, CISM ...

Video: 2007 Tech News Review A recap of the biggest technology news of 2007.


EVERYTHING THAT MATTERS
Clear Choice Test Exploring what matters most in IT today.

TAMING THE VIRTUAL BEAST
Clear Choice Test VM management tools from Microsoft, VMware, XenSource leave room for improvement.

SPONSORED BY SHUNRA
rule

Get More From Your WAN
Download the latest Network World Executive Guide and get eight case studies that detail how real-world organizations are employing cutting-edge technologies to optimize their WAN. Learn about trunk expansion, MPLS and Metro Ethernet, and also get the latest testing and research the Network World Lab Alliance.

rule

Holiday Tech Toys
Stumped on what gadgets and gizmos to give this holiday? Have no fear, Cool Tools' Keith Shaw is here. We do all of the heavy lifting of wading through hundreds of submitted technology products to find the very best holiday gift ideas. Click here to view our holiday gift guide: http://www.nww.com/PSA2_1210

Featured reader resource

90% of IT Managers are leaving their company at risk for a DNS ATTACK. Get the tools and resources you need to keep your DNS healthy and secure. Run a DNSreport on your domain today - 56 critical tests run in 8 seconds.

Visit www.dnssfuff.com to learn more. (apply coupon NWW2007NLA for a 25% membership discount)

 

12/21/07

TODAY'S MOST-READ STORIES:

  1. How to really bury a mainframe
  2. 2007 Cool Yule Tools Gift Guide
  3. Cisco warns of firewall flaws
  4. Google Toolbar flaw opens door for phishers
  5. Microsoft lets everyone try XP SP3
  6. 10 crazy USB stocking stuffers
  7. 15 must-have Firefox tricks
  8. The IT pro vs. Verizon customer service
  9. BGP bug bites Juniper software
  10. Feds are dropping the ball on IPv6


TOP 100 OF 2007


Webcast: Beyond perimeter security

Listen to industry experts discuss the need for strong security throughout an IT environment. One expert says, the barbarians are not at the gate, they are already inside. Securing one access point to your network simply is not enough. Learn more today.

Access this webcast now.



IT Buyers guide

IT Buyer's Guides
Compare products, get advice, and check out tests and reviews from the experts at Network World. Over 70 categories. Visit now.

 


To continue receiving NetworkWorld's Security Alert newsletter, please add @nwfnews.com to your white list.

COMPLIMENTARY SUBSCRIPTIONS AVAILABLE
As a NW newsletter subscriber you are eligible to receive 50 issues of Network World Magazine, in print or electronic format, free of charge.

Sign up for your subscription today: Apply here. International subscribers,click here.

 

SUBSCRIPTION SERVICES
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Terms of Service/Privacy

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772
Copyright Network World, Inc., 2007

 

 



No comments:

Post a Comment