Search This Blog

Friday, April 03, 2009

Security Kung-Fu; Conficker Worm: Not Finished Yet; Microsoft warns of PowerPoint attack

Four steps on how to turn tough times to your advantage
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Code Green Networks
rule

Don't let data walk out the door.
With the large number of layoffs today, your confidential data may be leaving with the employee who was let go. Attend this Webcast and learn strategies to protect your network from dismissed employees; how data is being stolen, and much more. Register today.

rule

Spotlight Story
Four steps to mastering security kung fu

By Jim Tiller, Vice President, Security Services, BT Americas
The current economic melee is forcing a corporate metamorphosis that, when combined with ever broadening security threats, presents information security groups with an opportunity to radically change their identity and value to the business. Read full story

Related News:

Microsoft warns of PowerPoint attack found in the wild Microsoft Subnet reports that Microsoft last evening issued Microsoft Security Advisory (969136) which warns of an attack using malicious PowerPoint files that could allow an attacker to remotely execute code.

Bill would give Obama power to shut down Internet, networks during cyber attacks Federal legislation introduced in the Senate this week would give President Obama the power to declare a cybersecurity emergency and then shut down both public and private networks including Internet traffic coming to and from compromised systems

Conficker Worm: Not Finished Yet April 1 has come and gone, and the Internet has not disintegrated and no major cyber-attacks were reported. But Conficker still remains a threat. Now don't panic, this doesn't mean cyber-Armageddon could strike at any minute, it just means you need to make sure your computer is fully updated if it isn't already. Feel better? Good, then let's take a look at what's going on.

IBM sees Conficker hitting 4% of PCs IBM is the second company in two days to suggest that the number of computers infected by the Conficker.C worm may be higher than previously thought.

April 2: if every worm could be as mild-mannered Conficker Microsoft Subnet says while the sky did not fall yesterday, the worm's notorious activation day, security researchers remain wary that the Conficker dudes (or dudettes) are now the owners of perhaps the world's largest botnet.

Conficker may be more widespread than previously thought The Conficker worm may have infected more machines than previously thought, according to Internet infrastructure provider OpenDNS.

Lobbyist urges more gov't coordination of cybersecurity World governments need to do more to fight cyberterrorism and protect the Internet from attacks, because the Web has become so vital to commerce and communications, AT&T Inc.'s top lobbyist told reporters Wednesday.

2008 was not a good year "I told you so" is not exactly the favorite comment for anyone to hear, but unfortunately sometimes it has to be said. ScanSafe starts its 2008 Annual Global Threat Report with some depressing comments.

SMEs stick 'heads in sand' over security Smaller and midsized businesses are cutting back on security due to the effects of the recession, even though most SMEs expect security threats to increase.

British hacker's supporters rally at U.S. embassy As protesters took to the streets again Thursday during the G20 world leaders summit, the U.S. embassy saw a much smaller rally in support of a British computer hacker.

April giveaways galore
Cisco Subnet
and Microsoft Subnet are giving away training courses from Global Knowledge, valued at $2,995 and $3,495, and have copies of three hot books up for grabs: CCVP CIPT2 Quick Reference by Anthony Sequeira, Microsoft Voice Unified Communications by Joe Schurman and Microsoft Office 2007 On Demand by Steve Johnson. Deadline for entries April 30.

Network World on Twitter Get our tweets and stay plugged in to networking news.


App to no good
10 iPhone apps that could get you into troubleA look at the top 10 iPhone apps that could get you into trouble.

CEO payday breakdown
CEO payday: How much tech chiefs made in '08A detailed account of how much tech chiefs made in 2008.

Sponsored by Code Green Networks
rule

Don't let data walk out the door.
With the large number of layoffs today, your confidential data may be leaving with the employee who was let go. Attend this Webcast and learn strategies to protect your network from dismissed employees; how data is being stolen, and much more. Register today.

rule

Complimentary DNS newsletter
Sign-up today and receive the latest DNS news and analysis. This newsletter provides deep insight into this murky area and offers ways to understand and mitigate risk with better management and control of your domain, email and DNS.
Sign up now


Network World's IT Resource Library
Whether you're looking to gear up on one specific topic or you're trying to stay current on several areas, Network World's resource library has what you're looking for. Our comprehensive collection of resources will make your job easier.
Visit Now

 

04/03/09

Today's most-read stories:

  1. Microsoft says phones are bad
  2. Five best router and switch features you never use
  3. Analyst: Apple readies two iPhone models
  4. RIM unveils BlackBerry application store
  5. Motorola exec dishes on LTE role
  6. Some UltraDNS customers knocked offline by attack
  7. Conficker activation passes quietly, but threat isn't over
  8. Top 10 technology skills
  9. Palm Pre: First impressions
  10. Is the Internet doomed to fail?
  11. Students learn through robot battles


Network World on Twitter: Get our tweets and stay plugged in to networking news


The Need for an Adaptive Threat Management Architecture - Live March 31.
Create a more secure and efficient network. Find out how in this Live Webcast, "The Need for an Adaptive Threat Management Architecture." Join us on Tuesday, March 31, 2009, at 1:00 p.m. ET/10:00 a.m. PT. Get real-world advice from Jon Oltsik, senior analyst at consulting firm Enterprise Strategy Group.
Register today for this Live Webcast.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: