Search This Blog

Thursday, January 03, 2008

'Diehard' virus variants flexing muscle; A new kind of firewall'Diehard' virus variants flexing musc

Security Alert

Network World logo
NetworkWorld.com | Security Research Center | Update Your Profile
'Diehard' virus variants flexing muscle

Ellen Messmer By Ellen Messmer
New Windows-based "downloader" malware known as Trojan-Downloader.Win32.Diehard has surged to the top of Kaspersky Lab's "Virus Top Twenty" list for December because of its "explosive propagation," the security firm said Wednesday. Read full story

Senior Editor Ellen Messmer covers security for Network World. Contact her at emessmer@nww.com.

MORE STORIESARROW


SPONSORED BY QUALYS
rule

Webcast: Five PCI Best Practices
Listen this to this webcast to learn the latest about the PCI Data Security Standard. Discover why you need to comply with this specification designed to keep owner credit card information private. Learn how to avoid PCI DSS compliance failure and five best practices to supporting the standard. Listen to this webcast now.

rule
RELATED NEWS:

A new kind of firewall, 12/20/07 With its new security technology, Palo Alto Networks gets tapped as a start-up that will matter in ’08.

Researcher says Sears downloads spyware, 01/01/08 Sears and Kmart customers who sign up for a new marketing program may be giving up more private information than they'd bargained for, a prominent anti-spyware researcher claims.

McAfee, Symantec CEOs talk security, 01/02/08 In early December, InfoWorld Senior Writer Matt Hines had the opportunity to sit down with John Thompson, chief executive of Symantec, and David DeWalt, chief executive of McAfee, to interview the leaders about the strategic direction of their companies and where they see different aspects of the IT security market heading in 2008 and beyond.

Malware evolving too fast for antivirus apps, 12/31/07 If you think that the latest security suites afford complete protection against malware attacks, think again. Today's for-profit malware pushers use dedicated test labs and other increasingly professional techniques to improve their chances of infecting your computer. And the techniques they employ to outpace security software makers appear to be working.

Personal information record losses reach new heights, 01/02/08 More than 120 million people in the U.S. had personal data exposed in 2007 as identity theft reached record heights. That's according to research from the nonprofit organization the Identity Theft Resource Center (ITRC) which reported 446 separate breaches exposing 128 million records.

What really matters in IT today, 12/20/07 Security clearly matters today, and the costs of getting wrong can be staggering. But many companies till don’t get it. Consider, for example, that few companies encrypt data on laptops, even though on average companies lose 4% to 5% of their laptops each year.

Top 9 questions you should ask when choosing remote access VPN Here are some questions that you can ask yourself in order to help you choose a remote access VPN protocol or technology ...

Encryption technologies for dummies Security expert Tyson Kopczynski insists that PKI has become easy to implement in all its many forms. "PKI isn't technically complex when you look at it from a broad view … when I talk to my clients, I like to relate PKI to municipal services such public water or electricity. Provided you build it correctly and maintain it 'things' can be plugged into it."

Microsoft launches Security Research and Defense site Microsoft Security Response Center is a new group inside Microsoft is run by Vinny Gullotto, formerly of Symantec and McAfee.

One-fifth of Windows apps go unpatched, 12/31/07 One in five applications installed on Windows PCs are missing security patches, a Copenhagen-based vulnerability tracker has reported.

Cisco Subnet January giveaways: Win a copy of 'Firewall Fundamentals' book We've got 15 copies of the Cisco Press book Firewall Fundamentals by Wes Noonan and Ido Dubrawsky up for grabs. Check out Wes Noonan's blog for Cisco Subnet.


EVERYTHING THAT MATTERS
Everything that Matters in IT Exploring what matters most in IT today.

TAMING THE VIRTUAL BEAST
Clear Choice Test VM management tools from Microsoft, VMware, XenSource leave room for improvement.

SPONSORED BY QUALYS
rule

Webcast: Five PCI Best Practices
Listen this to this webcast to learn the latest about the PCI Data Security Standard. Discover why you need to comply with this specification designed to keep owner credit card information private. Learn how to avoid PCI DSS compliance failure and five best practices to supporting the standard. Listen to this webcast now.

rule

Complimentary Subscriptions for IT Professionals
Sign up today and receive a yearly subscription to Network World magazine. Each week Network World is jam-packed with news, analysis, expert industry opinions and management advice that many network IT professional can't live without. Why not join them? Click here to subscribe: http://www.nww.com/PSA2_0102

Featured reader resource

90% of IT Managers are leaving their company at risk for a DNS ATTACK. Get the tools and resources you need to keep your DNS healthy and secure. Run a DNSreport on your domain today - 56 critical tests run in 8 seconds.

Visit www.dnssfuff.com to learn more. (apply coupon NWW2007NLA for a 25% membership discount)

 

01/03/08

TODAY'S MOST-READ STORIES:

  1. Eight can't-miss tech predictions for 1998
  2. The 15 best downloads of the year
  3. AOL to end support for Netscape browser
  4. 12 IT skills that employers can't say no to
  5. Storm switches tactics third time
  6. Everything that matters in IT
  7. Security dominates 2008 IT agenda
  8. 20 great Firefox extensions
  9. The 25 most innovative products of the year
  10. Management in '08: Can you say automate?

FEATURED BUYER'S GUIDE:
Network Monitoring and Management


Webcast: Beyond perimeter security

Listen to industry experts discuss the need for strong security throughout an IT environment. One expert says, the barbarians are not at the gate, they are already inside. Securing one access point to your network simply is not enough. Learn more today.

Access this webcast now.



IT Buyers guide

IT Buyer's Guides
Compare products, get advice, and check out tests and reviews from the experts at Network World. Over 70 categories. Visit now.

 


To continue receiving NetworkWorld's Security Alert newsletter, please add @nwfnews.com to your white list.

COMPLIMENTARY SUBSCRIPTIONS AVAILABLE
As a NW newsletter subscriber you are eligible to receive 50 issues of Network World Magazine, in print or electronic format, free of charge.

Sign up for your subscription today: Apply here. International subscribers,click here.

 

SUBSCRIPTION SERVICES
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Terms of Service/Privacy

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772
Copyright Network World, Inc., 2007

 

 



No comments: