Monday, March 30, 2009

April Fool's Conficker Threat is Likely Hype; Deep computer-spying network touched 103 countries

Firefox patches zero-day, hacking contest bugs; Hack contest sponsor confirms IE8 bug in final code
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Dell
rule

Windows Vista Security Features
Experts from Dell, Microsoft and Ziff Davis Enterprise detail the key security features of Windows Vista - including Windows Security Center, Windows Defender, Windows BitLocker Drive Encryption, Improved Authentication and Log on, and User Account Controls/Group Policy Objects.

rule

Spotlight Story
April Fool's Conficker Threat is Likely Hype

By Erik Larkin
There's some serious FUD out there right now about what the Conficker worm will do on April 1. But according to those in the know, you probably don't have to worry. Read full story

Related News:

Deep computer-spying network touched 103 countries A 10-month cyberespionage investigation has found that 1,295 computers in 103 countries and belonging to international institutions have been spied on, with some circumstantial evidence suggesting China may be to blame.

Firefox patches zero-day, hacking contest bugs Just days after a hacker released code that could be used to attack the Firefox browser, Mozilla developers have a fix.

Firefox likely to win race to fix PWN2OWN contest bug Unless its two biggest rivals take extraordinary steps, Mozilla will be the first browser maker to patch a critical vulnerability used a week ago to win $5,000 in a hacking contest.

Google plays down security concerns over Docs Google Docs users shouldn't lose sleep over the security concerns a security analyst has raised about the hosted suite of office productivity applications, Google said late Friday.

Security analyst spots three flaws in Google Docs A security analyst says he's found three glitches in Google Docs that could expose private data, but Google said the issues don't pose a security risk.

Hack contest sponsor confirms IE8 bug in final code The final version of Microsoft's Internet Explorer 8 (IE8) does contain the vulnerability used to hack a preview of the browser at last week's Pwn2Own, the contest's sponsor confirmed Friday.

Creation of White House cybersecurity office still uncertain It's unclear whether a report being prepared for President Barack Obama on federal information security preparedness will support recent calls for the creation of a new cybersecurity office within the White House, two lawmakers said Thursday.

Study: Security, Not Environment, Drives E-waste Disposal IT managers are concerned about where their electronic equipment is going after disposal because they are worried about sensitive data loss, not the environment, according to a new survey.

Security More Important Than Ever in Tough Times John Martinicky has seen good years and bad years in his time with Navistar International, a Warrenville, Ill.-based manufacturer of heavy trucks and engines. Martinicky has been with the company more than 30 years, and has served in the security department since 1982. He was recently named a 2009 Compass Award winner by CSO.

Prevent intrusions: What to look for In the Buying Tips section of our Product Guide, find 15 questions to ask about IPS before you buy one.

Enter for a Microsoft training giveaway from New Horizons
New Horizons Computer Training is offering a free Microsoft training course worth up to $2,500 to be given to one lucky Microsoft Subnet reader. Deadline for entry is March 31.

Network World on Twitter Get our tweets and stay plugged in to networking news.


App to no good
10 iPhone apps that could get you into troubleA look at the top 10 iPhone apps that could get you into trouble.

CEO payday breakdown
CEO payday: How much tech chiefs made in '08A detailed account of how much tech chiefs made in 2008.

Sponsored by Dell
rule

Windows Vista Security Features
Experts from Dell, Microsoft and Ziff Davis Enterprise detail the key security features of Windows Vista - including Windows Security Center, Windows Defender, Windows BitLocker Drive Encryption, Improved Authentication and Log on, and User Account Controls/Group Policy Objects.

rule

Create Your Own Agenda at IT Roadmap
Customize a day of learning just for yourself! Attend IT Roadmap Conference & Expo and explore new solutions and examine new technology across 10 relevant areas of IT. Security, Virtualization, SaaS, VoIP, Green IT and more. 10 U.S. cities in '09. Next up.. NYC-Feb, Denver-March, Chicago-April.
Select your city, register and attend free!


Complimentary DNS newsletter
Sign-up today and receive the latest DNS news and analysis. This newsletter provides deep insight into this murky area and offers ways to understand and mitigate risk with better management and control of your domain, email and DNS.
Sign up now at

 

03/30/09

Today's most-read stories:

  1. Google: IPv6 is easy, not expensive
  2. IETF to explore new routing technique
  3. Microsoft rules netbooks now, but ARM/Linux threat grows
  4. New ransomware holds Windows files hostage, demands $50
  5. Will IBM layoffs mean more jobs sent overseas?
  6. Nasty new worm targets home routers, cable modems
  7. Solid-state flash products hit market en masse
  8. IPv6 is not backwards compatible, developers admit
  9. CEO payday: How much tech chiefs made in '08
  10. Seven reasons MPLS has been wildly successful
  11. Students learn through robot battles


Network World on Twitter: Get our tweets and stay plugged in to networking news


The Need for an Adaptive Threat Management Architecture - Live March 31.
Create a more secure and efficient network. Find out how in this Live Webcast, "The Need for an Adaptive Threat Management Architecture." Join us on Tuesday, March 31, 2009, at 1:00 p.m. ET/10:00 a.m. PT. Get real-world advice from Jon Oltsik, senior analyst at consulting firm Enterprise Strategy Group.
Register today for this Live Webcast.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment