Friday, February 27, 2009

Cisco unleashes a dozen security advisories; Hackers still enjoy vandalizing Web sites

Commerce chief faces 5 Internet emergencies; Scammers abuse Google Trends to poison search results
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Oracle
rule

Oracle Database 11g: Transparent Solutions for Security and Compliance
Historically most organizations have relied on network perimeter and application level security to restrict access to sensitive data, leaving their databases and the sensitive information inside exposed. With Oracle Database 11g organizations can now deploy reliable data security solutions that leverage the security capabilities inside the database, do not require any changes to existing applications, and minimize the costs associated with regulatory compliance and the deployment of strong internal controls.

rule

Spotlight Story

Cisco unleashes a dozen security advisories
Cisco released advisories and/or patches for Cisco IOS/BGP, Cisco Application Networking Manager, Unified MeetingPlace Web Conferencing Server and Application Control Engine. Read more.

Related News:

Network World on Twitter Get our tweets and stay plugged in to networking news.

Study: Hackers still enjoy vandalizing Web sites A study of 57 Web site hacks from last year showed that 24% were aimed at defacing a site rather than financial gain.

Commerce chief faces 5 Internet emergencies If former Washington State Gov. Gary Locke (D) is confirmed as the new U.S. Commerce Secretary, he'll face several Internet policy issues that require immediate attention and decisive action in 2009.

Scammers abuse Google Trends to poison search results Cyber crooks are using one of Google's own tools to poison search results with links that spread fake security software, a researcher said Thursday.

MessageLabs: Spammers pull at the heart in February The start of February saw Internet spam levels rise to as high as 79.5% of all e-mails due to a spike in botnet activity and spammers leveraging the financial crisis and Valentine's Day, according to MessageLabs.

Identity theft morphs, but maintains lead as FTC's top consumer complaint For the ninth year in a row identity theft - particularly in Arizona and California - was the number one consumer complaint filed with the Federal Trade Commission in 2008. Of 1,223,370 complaints received in 2008, 313,982 - or 26% - were related to identity theft.

FCC threatens fines on data protection rules The U.S. Federal Communications Commission may fine 600 operators for failing to properly file annual reports proving that they protect customer data.

SEC, FTC investigating Heartland after data theft Federal agencies, including the U.S. Federal Trade Commission and the U.S. Securities and Exchange Commission, have begun investigating Heartland Payment Systems following a massive data breach at the payment processing company.

How to Achieve More 'Agile' Application Security Application security has become a critical component of all software development efforts. It includes all measures taken throughout the software development lifecycle to prevent programming flaws from being exploited. The flaws that creep in during the requirements, design, development, deployment, upgrades, or maintenance stages of applications become the basis of cyber attacks.

Report cites potential privacy gotchas in cloud computing Companies looking to reduce their IT costs and complexity by tapping into cloud computing services should first make sure that they won't be stepping on any privacy land mines in the process, according to a report released this week by the World Privacy Forum.

Compliance Complaints IDC, a sister company to CSO, predicts that IT security spending will still grow by nearly 10 percent in 2009, and even faster in 2010. They characterize security as "the least likely area [in IT] to face cuts in response to the current economic crisis.

U.K. declines to prosecute hacker wanted in U.S. British authorities said Thursday they won't prosecute a hacker who would prefer to face trial in his own country rather than face extradition to the U.S.

February giveaways from Cisco Subnet and Microsoft Subnet
Up for grabs: One American Express gift card worth $250 from Global Knowledge; One Microsoft training course worth $2,995 from Global Knowledge; 15 copies each of the hot book titles Voice over IP Security, and CCNA Wireless Official Exam Certification Guide and 15 copies of Exchange Server 2007 How-To: Real Solutions for Exchange Server 2007 SP1 Administrators. Get all the entry details here.


Best of the Tests 2009
Best of the Tests 2009Out of the more than 150 products tested, a baker's dozen rise to the top of the list.

Fave Raves
2009 Fave RavesSix readers dish on their must-have network products, from desktop systems to wireless access points.

Sponsored by Oracle
rule

Oracle Database 11g: Transparent Solutions for Security and Compliance
Historically most organizations have relied on network perimeter and application level security to restrict access to sensitive data, leaving their databases and the sensitive information inside exposed. With Oracle Database 11g organizations can now deploy reliable data security solutions that leverage the security capabilities inside the database, do not require any changes to existing applications, and minimize the costs associated with regulatory compliance and the deployment of strong internal controls.

rule

Webcast: Data center server selection.
Forrester Research's Brad Day helps IT professionals refine their server selection criteria in this informative Webcast, "Beyond Systems Performance." Ensure you will make the right decision for your next-generation data center. Get Day's tips on creating a cost-efficient environment that delivers the performance and long-term resiliency you require.
Watch this Webcast now.


Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies.
Download this Executive Guide now.

 

02/27/09

Today's most-read stories:

  1. Turning 5,000 discarded cell phones into art
  2. Verizon Wireless takes aim at pesky 'Rabbit'
  3. IPhone plagues Princeton with flaky Wi-Fi problems
  4. New Google dashboard provides downtime information
  5. 40% of geeks surveyed really work fewer than ... say what?
  6. Microsoft has big growth plans even as economy limps
  7. Juniper's answer to Cisco in the data center: Stratus Project
  8. Juniper joins top-of-rack switch fray
  9. Top 10 removable media security incidents
  10. Nortel announces more layoffs
  11. Microsoft TechFest: Commute UX dialog system for in-car infotainment


Network World on Twitter: Get our tweets and stay plugged in to networking news


A Simplified Data Center - Live March 12
Contain costs and improve efficiency and reliability by simplifying your data center architecture. On March 12, data center design and implementation experts share in-depth advice on new approaches and examples of deployments - including price, performance and savings.
Register today for this Live Webcast.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment