Monday, April 06, 2009

Cries of protest over news of cybersecurity bill; IT security vendors worth following on Twitter

The Senate cybersecurity bill not an April Fools' gag; Conficker copycat prowls for victims
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by APC
rule

Learn how to Sure Up your Virtual World
Download this Executive Guide - Taking Virtualization Up a Notch - to get caught up-to-speed on virtualization issues you need to know about. Learn how to address management, application and security concerns as virtualization expands throughout the data center. Read this Guide today.

rule

Spotlight Story
Cries of protest, censorship greet news of cybersecurity bill

John Fontana By John Fontana
Communism, Fascism, treading on liberties, censorship and other political cries greeted the news of proposed legislation in the U.S. Senate that would give the president power to disconnect the Internet. Read full story

Related News:

IT security vendors worth following on Twitter Enterprise IT companies are setting up Twitter accounts in droves, and security companies are among the most enthusiastic given that Twitter is ideal for quick updates on vulnerabilities such as Conficker/Downadup..

Conficker copycat prowls for victims, says Microsoft An old, but little-known worm has copied some of the infection strategies of Conficker, the worm that raised a ruckus last week, Microsoft security researchers said late Friday.

Websense unveils its first Web security appliance The V10000 Web Gateway Appliance will run the vendor’s Secure Web Gateway Software including anti-malware filtering, SSL traffic inspection, application controls, and threat protections for Web surfing.

After Conficker: A PowerPoint Zero-Day Flaw Just when you thought you were safe from dangers such as the Conficker worm comes another hole in Microsoft's security, this time in the form of a PowerPoint zero-day vulnerability. Microsoft issued a statement yesterday warning PowerPoint users not to open unknown or unexpected PowerPoint e-mail attachments. These .ppt or .pps files may contain a virus that allows remote code execution, meaning hackers can pirate your computer and force it to function at will.

Is Conficker Finally History? Is it time to put Conficker in the history books? Is Conficker really a dud? The truth is, nobody knows. Conficker gained so much attention in part because of the sheer number of computers it was able to infect. But nobody knows for sure what Conficker can accomplish. However, at the time of this writing no Conficker-related catastrophes have surfaced and some think the threat never will. So as attention shifts away from Conficker, it's important to know where we stand against the world's most famous piece of malware.

Cloud computing needs better security, interoperability to live up to hype If cloud computing is to move beyond the hype cycle, vendors need to put aside their differences and agree on common principles related to security and the interoperability of cloud platforms.

Reputation scoring changes enterprise security game When it comes to personal and business relationships, a good reputation opens doors while a bad one slams them shut. And so it goes with enterprise security, too.

Senators introduce texting spam bill Two U.S. senators have introduced a bill aimed at attacking a growing problem: unsolicited commercial text messages or mobile spam.

Three spammers sentenced in U.S. for advance fee fraud Two Nigerians and a Frenchman were sentenced to prison Thursday for swindling people out of more than $1.2 million in a massive e-mail scam, the U.S. Department of Justice said.

April giveaways galore
Cisco Subnet
and Microsoft Subnet are giving away training courses from Global Knowledge, valued at $2,995 and $3,495, and have copies of three hot books up for grabs: CCVP CIPT2 Quick Reference by Anthony Sequeira, Microsoft Voice Unified Communications by Joe Schurman and Microsoft Office 2007 On Demand by Steve Johnson. Deadline for entries April 30.

Network World on Twitter Get our tweets and stay plugged in to networking news.


App to no good
10 iPhone apps that could get you into troubleA look at the top 10 iPhone apps that could get you into trouble.

CEO payday breakdown
CEO payday: How much tech chiefs made in '08A detailed account of how much tech chiefs made in 2008.

Sponsored by APC
rule

Learn how to Sure Up your Virtual World
Download this Executive Guide - Taking Virtualization Up a Notch - to get caught up-to-speed on virtualization issues you need to know about. Learn how to address management, application and security concerns as virtualization expands throughout the data center. Read this Guide today.

rule

Accurately Troubleshoot your Apps
Optimize your application troubleshooting efforts with the best practices described in this whitepaper, "Application Troubleshooting Guide." Eliminate finger pointing between departments. Find out how to isolate the source of application performance problems and what to look for when troubleshooting. Get all of the details today.
Download this whitepaper now.


Complimentary DNS newsletter
Sign-up today and receive the latest DNS news and analysis. This newsletter provides deep insight into this murky area and offers ways to understand and mitigate risk with better management and control of your domain, email and DNS.
Sign up now

 

04/06/09

Today's most-read stories:

  1. Bill would give Obama power to shut down Internet
  2. Microsoft says phones are bad
  3. Five best router and switch features you never use
  4. How to cut costs and get more from your gear
  5. Mobile Skype: The end of cellular as we know it
  6. From free to fee: Seven services adding new charges
  7. Analyst: Apple readies two iPhone models
  8. RIM unveils BlackBerry application store
  9. Top 10 technology skills
  10. Conficker worm: Not finished yet
  11. Students learn through robot battles


Network World on Twitter: Get our tweets and stay plugged in to networking news


Accurately Troubleshoot your Apps
Optimize your application troubleshooting efforts with the best practices described in this whitepaper, "Application Troubleshooting Guide." Eliminate finger pointing between departments. Find out how to isolate the source of application performance problems and what to look for when troubleshooting. Get all of the details today.
Download this whitepaper now.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment