Tuesday, January 27, 2009

What's the Conficker worm got to do with NAC?

Conficker is a classic black-and-white case in favor of using NAC to fight infection
Network World logo

Security: Network Access Control Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Akamai Technologies
rule

Fulfill Your Remote Access Strategy for Mobile Users
Transform the Internet into a business-ready application delivery platform and achieve a successful remote access strategy. Download this Frost & Sullivan report today:

rule

Spotlight Story
What's the Conficker worm got to do with NAC?

Tim Greene By Tim Greene
The Conficker worm doesn't directly have anything to do with NAC, but as is the case when any pervasive attack becomes high profile, vendors leap in to point out how their products could have prevented the problem. Read full story

Tim Greene is senior editor at Network World.

Related News:

Microsoft warns of malware exploiting known vulnerability Microsoft is warning users of a rise in attacks on a vulnerability in Windows that could trigger a worm infestation on networks, and the company is encouraging companies to apply an emergency patch released in October.

Conficker Worm Attack Getting Worse: Protect Yourself Millions of Windows computers have been infected by a new computer worm dubbed "Conficker." The situation is "not getting better," but rather is "getting worse," according to security software vendor F-Secure.

Panda Security: Downadup worm now infects 1 in every 16 PCs The computer worm responsible for the biggest attack in years has infected at least 1 out of every 16 PCs worldwide, a security company said Wednesday, and may have managed to compromise as many as nearly 1 in 3.

'Amazing' worm attack infects 9 million PCs Calling the scope of the attack "amazing," security researchers at F-Secure Friday said that 6.5 million Windows PCs have been infected by the "Downadup" worm in the last four days, and that nearly 9 million have been compromised in just over two weeks.

Researcher: Worm infects 1.1M Windows PCs in 24 hours The computer worm that exploits a months-old Windows bug has infected more than a million PCs in the past 24 hours, a security company said Wednesday.

January giveaways from Cisco Subnet and Microsoft Subnet
Up for grabs: Two Cisco training courses from Skyline-ATS worth up to $6,990, a Microsoft training course from New Horizons worth up to $2,500, 15 copies each of the hot book titles Microsoft SQL Server 2008 Management and Administration, IPv6 Security and Chained Exploits: Advanced Hacking Attacks. Get all the entry details here.


Betting on SuperNAP
In Las Vegas, data center takes power and cooling to the limitIn Las Vegas, data center takes power and cooling to the limit.

Data gone missing
10 woeful tales of data gone missing10 woeful tales involving backup tapes: some current, some classic and one just plain unusua.

Sponsored by Akamai Technologies
rule

Fulfill Your Remote Access Strategy for Mobile Users
Transform the Internet into a business-ready application delivery platform and achieve a successful remote access strategy. Download this Frost & Sullivan report today:

rule

Effectively Managing Change.
Find the right network/system management platforms that leverage the latest IT technologies in this Executive Guide, "The New Network/System Management Challenges." Get a handle on server sprawl, managing 802.11n wireless LANs, and data center automation tool integration. Confidently deploy innovative technologies that drive efficiencies today.
Download this Executive Guide now.


Successfully Manage a Secure Database.
Database professionals are invited to join this Oracle Live Webcast on Thursday, February 5 at 2:00 p.m. ET/11:00 a.m. PT. Gain a better understanding of database security and how to more strategically work with security administrators. Don't miss out.
Register for this live webcast now.

 

01/27/09

Today's most-read stories:

  1. Downadup/Conflicker worm: When will the next shoe fall?
  2. iPhone to get global flat-fee voice service
  3. Windows 7: the untold story of how the enterprise gets snubbed
  4. Open source identity: Linux founder Linus Torvalds
  5. FAQ: How to protect your PC against the Downadup worm
  6. Brocade's new CTO takes aim at Cisco
  7. Heartland tries to rally industry in wake of data breach
  8. IBM confirms layoffs
  9. Apple puts iPhone Nano and Netbook rumors to rest
  10. Microsoft 'can't imagine' PS3 catching up to Xbox 360


MOST DUGG STORIES


Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe in this Executive Guide. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies explained in this report.
Download this Executive Guide now.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment