Friday, December 19, 2008

2009 security predictions: Deja vu all over again; As phishing evolves, criminals switch to malware

IT operations, security pros at odds over virtualization risks
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Alcatel-Lucent
rule

SOA Governance and Compliance
Hear about the latest industry trends around new heightened information security regulations in this on-demand Webcast featuring Andreas Antonopoulos from Nemertes Research. Get solutions that reduce your company's risk and allows you to better manage your environment. Watch now.

rule

Spotlight Story
2009 security predictions: Deja vu all over again

By Jaikumar Vijayan
The security industry is fueled largely by FUD (Fear Uncertainty and Doubt.) So it's not unusual for most forecasts in the industry to be full of grim prognostications of imminent chaos and calamities. Read full story

Related News:

As phishing evolves, criminals switch to malware The scammers began to see serious problems with their phishing scams sometime around April.

IT operations, security pros at odds over virtualization risks Does transitioning to virtualization increase security risks within a company? IT managers appear to be at loggerheads with IT security professionals over that question, even while sharing similar opinions on where ...

Retail standards group to tackle virtualization security in '09 In the coming year, the PCI Security Standards Council will tackle a number of new areas of concern, such as computer virtualization, where it may set security guidelines for use in card processing. Given virtualization's growing popularity, that has a lot of people paying attention.

Symantec unveils Norton Internet Security 4.0 for Mac Symantec Thursday announced Norton Internet Security 4.0 for the Mac, desktop antimalware, firewall, antiphishing and online Web-threat protections for the Mac OS X 10.4 "Tiger" and 10.5 "Leopard" platforms.

Oops! Mozilla forgets Firefox 2 patch, must re-issue update A "clerical error" by Mozilla omitted one of the security patches that was supposed to be included in the Windows version of Tuesday's Firefox 2.0.0.19 release, a company executive said Wednesday.

Hackers exploit IE bug with 'insidious' Word docs Attackers are exploiting the just-patched vulnerability in Internet Explorer (IE) by hiding malicious ActiveX controls in Microsoft Word documents, a security company said Thursday.

Malware hunting One of Gibbs' Windows XP machines is acting up. Again. Looks like he's got a case of malware but it seems to be a little hard to find.

Cisco revs up competition with '09 blade plans, security moves Next year will see Cisco deliver a "Big Bang" in switching, blade servers for the data center, high-definition TelePresence conferencing for the home, and a security plan for virtualized and cloud computing environments...

$8M Cisco SMARTnet Scamster faces 30 years in prison Cisco Subnet blogger Brad Reese writes: The "perp" in an $8 million Cisco SMARTnet scam, Steven Edward Miller age 38, pled guilty last week before United States District Judge Michael W. Mosman in Portland, Oregon, to one count of money laundering and one count of mail fraud.

2008 Cool Yule Tools
Get a head start on your holiday shopping by checking out our annual technology toy gift guide. We've done reviews of more than 100 products and have suggestions in 11 different categories, ranging from smart phones to PCs and notebooks to the coolest gadgets and entertainment options.

December giveaways from Cisco Subnet and Microsoft Subnet
Head over to Cisco Subnet and Microsoft Subnet, where we are giving away free books and free training. Up for grabs is one free training course worth up to $2,995 from Global Knowledge, 15 copies of Cisco Voice over IP (CVOICE)(Authorized Self-Study Guide), 3rd Edition and five sets of a five-book Microsoft library that covers WS2008, SharePoint, PowerShell and more. Get all the entry details here.


2008 Holiday Gift Guide
Products of the WeekFrom phones to computers to the hottest video games, we've got a bunch of great gift ideas.

Top Microsoft Shop Tools
8 little-known technologies that instantly make Microsoft shops run smoother8 little-known technologies that instantly make Microsoft shops run smoother.

Sponsored by Alcatel-Lucent
rule

SOA Governance and Compliance
Hear about the latest industry trends around new heightened information security regulations in this on-demand Webcast featuring Andreas Antonopoulos from Nemertes Research. Get solutions that reduce your company's risk and allows you to better manage your environment. Watch now.

rule

Metzler: Improving your App Delivery
Successfully implement an integrated application delivery strategy with the right set of software tools. Improve network and application visibility by combining application performance appliances with an integrated management platform. Jim Metzler shares his tips on how to achieve this goal in this whitepaper.
Download this whitepaper now.


Clearing Today's IT Management Hurdles
Learn how to effectively manage your increasingly virtualized, mobile and automated IT environment. Make the best IT optimization decisions that match your IT goals. Ensure you have the most up-to-date information to make the best management choices.
Download this Executive Guide now.

 

12/19/08

Today's most-read stories:

  1. Reproduction of 2,100-year-old calculator deepens mystery
  2. Cisco among three bidders for Nortel's Ethernet biz
  3. Eight ways to expense an iPhone
  4. Firefox issues eight patches for Web browser
  5. Could a management titan topple in 2009?
  6. Microsoft's virtualization myths busted or confirmed
  7. The top 10 Cisco stories of 2008
  8. Five ways to secure your BlackBerry
  9. Juniper maps out 2009 plans
  10. Five ways to stop Social Security number identity theft


Network Security you Need
Zero in on the hottest security technologies you need to know about in this Executive Guide, "The Evolution of Network Security." Stay out in front with the most up-to-date information on network security. Better protect your IT environment with NAC, data leakage prevention controls and auditing tools.
Download this Executive Guide now.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2008

www.networkworld.com

 

 



No comments:

Post a Comment