IT security vendors worth following on Twitter Enterprise IT companies are setting up Twitter accounts in droves, and security companies are among the most enthusiastic given that Twitter is ideal for quick updates on vulnerabilities such as Conficker/Downadup.. Conficker copycat prowls for victims, says Microsoft An old, but little-known worm has copied some of the infection strategies of Conficker, the worm that raised a ruckus last week, Microsoft security researchers said late Friday. Websense unveils its first Web security appliance The V10000 Web Gateway Appliance will run the vendor’s Secure Web Gateway Software including anti-malware filtering, SSL traffic inspection, application controls, and threat protections for Web surfing. After Conficker: A PowerPoint Zero-Day Flaw Just when you thought you were safe from dangers such as the Conficker worm comes another hole in Microsoft's security, this time in the form of a PowerPoint zero-day vulnerability. Microsoft issued a statement yesterday warning PowerPoint users not to open unknown or unexpected PowerPoint e-mail attachments. These .ppt or .pps files may contain a virus that allows remote code execution, meaning hackers can pirate your computer and force it to function at will. Is Conficker Finally History? Is it time to put Conficker in the history books? Is Conficker really a dud? The truth is, nobody knows. Conficker gained so much attention in part because of the sheer number of computers it was able to infect. But nobody knows for sure what Conficker can accomplish. However, at the time of this writing no Conficker-related catastrophes have surfaced and some think the threat never will. So as attention shifts away from Conficker, it's important to know where we stand against the world's most famous piece of malware. Cloud computing needs better security, interoperability to live up to hype If cloud computing is to move beyond the hype cycle, vendors need to put aside their differences and agree on common principles related to security and the interoperability of cloud platforms. Reputation scoring changes enterprise security game When it comes to personal and business relationships, a good reputation opens doors while a bad one slams them shut. And so it goes with enterprise security, too. Senators introduce texting spam bill Two U.S. senators have introduced a bill aimed at attacking a growing problem: unsolicited commercial text messages or mobile spam. Three spammers sentenced in U.S. for advance fee fraud Two Nigerians and a Frenchman were sentenced to prison Thursday for swindling people out of more than $1.2 million in a massive e-mail scam, the U.S. Department of Justice said. April giveaways galore Cisco Subnet and Microsoft Subnet are giving away training courses from Global Knowledge, valued at $2,995 and $3,495, and have copies of three hot books up for grabs: CCVP CIPT2 Quick Reference by Anthony Sequeira, Microsoft Voice Unified Communications by Joe Schurman and Microsoft Office 2007 On Demand by Steve Johnson. Deadline for entries April 30. Network World on Twitter Get our tweets and stay plugged in to networking news. |
No comments:
Post a Comment