Search This Blog

Wednesday, April 15, 2009

April Patch Tuesday is a whopper; 5 Ways To Survive a Data Breach Investigation

Microsoft's Patch Tuesday filled with zero-day exploits; Organized crime caused big data breach spike
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Security Smart Newsletter
rule

Save time and effort on security awareness training
The Security Smart quarterly security awareness newsletter grabs your employees' attention by presenting security topics in a dynamic useful way. You'll save money, time and energy while making your organization Security Smart. View sample issues and subscribe today! From the editors at CSO Magazine.

rule

Spotlight Story

Microsoft's Patch Tuesday filled with zero-day exploits
Microsoft's Patch Tuesday arrived with a nasty twist, as six of the 23 vulnerabilities spread among the eight patches are already being threatened by exploit code in the wild.
Also: Microsoft Patch Tuesday: List of software affected by critical security updates
Microsoft Patch Tuesday whopper: Eight bulletins fix 23 holes in Windows, Office, IE and more

Related News:

Organized crime caused big data breach spike, says Verizon A new study from Verizon Business claims that organized crime is responsible for a large increase in the number of breached corporate electronic records, which totaled roughly 285 million last year.

5 Ways To Survive a Data Breach Investigation Security experts say it all the time: If a company thinks it has suffered a data security breach, the key to getting at the truth unscathed is to have a response plan in place for what needs to be done and who needs to be in charge of certain tasks. And, as SANS Institute instructor Lenny Zeltser advised in CSOonline's recent How to Respond to an Unexpected IT Security Incident article, "ask lots and lots of questions" before making rash decisions.

Malicious code spikes in '08, Symantec reports Malicious code threats more than doubled, and the United States retained the dubious distinction of being the top cyber sore spot, according to Symantec's 2008 Internet Security Threat Report.

Twitter Worm: A Closer Look at What Happened It looks like Twitter's Web site has been scrubbed clean after several bouts of the "Mikeyy" or "StalkDaily" worm plagued the service. Even though the threat seems to have passed, questions remain about just how serious this attack was and if there will be any repercussions for the worm's creator.

Security vendor Marshal8e6 buys Avinti Security vendor Marshal8e6 will buy Avinti, a company which specializes in behavioral technology that scans e-mail and tests malicious content in a virtual machine.

Buzzblog: What's the carbon footprint of spam?...(Like I care) It's official: Carbon-footprint mania has flown past "getting to be a bit much" and landed smack in the middle of a cow patty (produced, of course, by one of those inscrutably oblivious bovine gas bags).

Top Trends: Patch Management Find out how patch-management products work, and what they can do for you, in this Product Guide.

April giveaways galore
Cisco Subnet
and Microsoft Subnet are giving away training courses from Global Knowledge, valued at $2,995 and $3,495, and have copies of three hot books up for grabs: CCVP CIPT2 Quick Reference by Anthony Sequeira, Microsoft Voice Unified Communications by Joe Schurman and Microsoft Office 2007 On Demand by Steve Johnson. Deadline for entries April 30.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Eye-catching gadgets at CTIA
10 eye-catching gadgets at CTIA From WiMAX hotspots to $2,000 cell phones, a look at what caught our attention at CTIA Wireless.

Are you an IT geezer?
Quiz: Are you an IT geezer? (and we mean that in a good way)Sure, the new generation knows Facebook, Android and Twitter. But what about ISDN, SNA and X.25? Take the quiz!

Sponsored by Security Smart Newsletter
rule

Save time and effort on security awareness training
The Security Smart quarterly security awareness newsletter grabs your employees' attention by presenting security topics in a dynamic useful way. You'll save money, time and energy while making your organization Security Smart. View sample issues and subscribe today! From the editors at CSO Magazine.

rule

DNS news and tips
DNS is not secure and is extremely vulnerable. DNS is at the core of every connection we make on the Internet. While some servers are indeed vulnerable, because of inadequate management or knowledge, the real threat is from the protocol itself and how data is easily subverted or faked as it moves around the internet.
Receive the latest DNS news and tips


Accurately Troubleshoot your Apps
Optimize your application troubleshooting efforts with the best practices described in this whitepaper, "Application Troubleshooting Guide." Eliminate finger pointing between departments. Find out how to isolate the source of application performance problems and what to look for when troubleshooting. Get all of the details today.
Download this whitepaper now.

 

04/15/09

Today's most-read stories:

  1. Fact-checking the fact-checkers: Snoopes.com gets an 'A'
  2. Conficker awakens, starts scamming
  3. The Internet Kill Switch
  4. Breakthrough enables Terabit Ethernet
  5. Netbook computers spark corporate interest
  6. Twitter worm attack continues: Here's how to keep safe
  7. The 10 worst Microsoft product names of all time
  8. Microsoft eating up U.S. and global netbook markets
  9. Bill would give Obama power to shut down Internet
  10. EMC's new Symmetrix array targets virtual data centers
  11. Students learn through robot battles


Network World on Twitter: Get our tweets and stay plugged in to networking news


Responsible for building a resilient data center
Then don't miss Network World's one-day conference and expo devoted to best practices and new solutions. Hear top analysts. Meet key vendors. Coming to 10 cities in '09 including Boston in May and Atlanta in June.
Register now to attend free: Visit



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: