Tuesday, April 14, 2009

Twitter Worm Attack Continues: How to Keep Safe; 1 in 5 Windows PCs still hackable by Conficker

The malicious worm affecting Twitter over the weekend has now mutated and continues to invade
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by HP
rule

HP Storage Virtualization Guide
Check out Network World's IT Roadmap on Storage virtualization. Learn how to reduce the complexity of managing, backing up and archiving data. Learn the differences between the three main storage virtualization technologies which are in the data path, out-of band and split path. Find out which technology is best suited for your environment.

rule

Spotlight Story
Twitter Worm Attack Continues: Here's How to Keep Safe

By Daniel Ionescu
The malicious worm affecting Twitter over the weekend has now mutated and continues to invade the popular micro-blogging network. Although Twitter is taking action against the problem, security analysts fear that further mutations of the worm will continue to wreak havoc on the network over the week. Read full story

Related News:

Twitter wrestles with fourth worm attack Another worm attack early Monday on Twitter kept the micro-blogging Web service chasing down infected accounts and deleting rogue tweets.

Weekend worms strike Twitter, teen admits responsibility Twitter was hit with at least three different worm attacks that started Saturday and continued into Sunday, the micro-blogging service acknowledged as it promised users it would review its coding practices.

1 in 5 Windows PCs still hackable by Conficker Although the media blitz about the Conficker worm prompted a significant number of enterprise users to finally fix a six-month-old Windows bug, about 1 in 5 business computers still lack the patch, a security company said Monday.

Botlab keeping an eye on spamming botnets University of Washington researchers have developed a prototype system called Botlab that monitors botnets to gain insight into a major generator of spam.

Does Social Networking Require User Policy Changes? IT security administrators have had a fairly easy case to make against such social networking sites as Myspace in the past. Myspace in particular tends to be a place for the mostly personal, and some profiles are simply front companies for online mobsters and malware pushers.

PCI security rules may require reinforcements The PCI standard, long touted as one of the private sector's strongest attempts to regulate itself on IT security, is increasingly being slammed by critics who claim that the rules aren't doing enough to protect credit and debit card data.

Can the status quo threaten your LAN? In times of economic crisis people tend to seek the safety and security of the status quo. "Doing what you've always done, and what everyone else is doing, is the most prudent course," goes the thinking.

Security Tops IT Budget Priorities Security is on the minds of American companies and many are still making room in their budgets to invest in IT security initiatives, according to a survey released Monday by Robert Half Technology.

Trend Micro dishes out security smorgasbord Trend Micro Monday dished out a smorgasbord of endpoint security products that put the focus on Trend's cloud-based architecture and its partnership with systems-management vendor BigFix.

RSA upgrades data leak prevention suite EMC's RSA division Monday announced an upgraded version of its data-leak prevention suite, adding over twenty policy templates for recognizing personal identifiable information in countries around the world, including Spain and New Zealand.

Podcast: Prepping for Tougher Health Data Rules As part of the recent stimulus bill, the HITECH Act will create standard electronic health records for every American by 2014, as well as introduce strict new rules for the protection of these health records. John Linkous from eIQnetworks discusses the components of the act and how IT can start preparing now for the new standards. (10:12)

User education key to IT security: Microsoft With the release of its latest Security Intelligence Report, Microsoft is encouraging its partners and customers to become more security aware and educated, as new attack tactics are on the rise.

Top Trends: Patch Management Find out how patch-management products work, and what they can do for you, in this Product Guide.

April giveaways galore
Cisco Subnet
and Microsoft Subnet are giving away training courses from Global Knowledge, valued at $2,995 and $3,495, and have copies of three hot books up for grabs: CCVP CIPT2 Quick Reference by Anthony Sequeira, Microsoft Voice Unified Communications by Joe Schurman and Microsoft Office 2007 On Demand by Steve Johnson. Deadline for entries April 30.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Eye-catching gadgets at CTIA
10 eye-catching gadgets at CTIA From WiMAX hotspots to $2,000 cell phones, a look at what caught our attention at CTIA Wireless.

Are you an IT geezer?
Quiz: Are you an IT geezer? (and we mean that in a good way)Sure, the new generation knows Facebook, Android and Twitter. But what about ISDN, SNA and X.25? Take the quiz!

Sponsored by HP
rule

HP Storage Virtualization Guide
Check out Network World's IT Roadmap on Storage virtualization. Learn how to reduce the complexity of managing, backing up and archiving data. Learn the differences between the three main storage virtualization technologies which are in the data path, out-of band and split path. Find out which technology is best suited for your environment.

rule

DNS news and tips
DNS is not secure and is extremely vulnerable. DNS is at the core of every connection we make on the Internet. While some servers are indeed vulnerable, because of inadequate management or knowledge, the real threat is from the protocol itself and how data is easily subverted or faked as it moves around the internet.
Receive the latest DNS news and tips


Accurately Troubleshoot your Apps
Optimize your application troubleshooting efforts with the best practices described in this whitepaper, "Application Troubleshooting Guide." Eliminate finger pointing between departments. Find out how to isolate the source of application performance problems and what to look for when troubleshooting. Get all of the details today.
Download this whitepaper now.

 

04/14/09

Today's most-read stories:

  1. Conficker awakens, starts scamming
  2. Microsoft eating up U.S. and global netbook markets
  3. Bill would give Obama power to shut down Internet
  4. Are you an IT geezer? (and we mean that in a good way)
  5. A Twitter virus shows up: StalkDaily
  6. The 10 worst Microsoft product names of all time
  7. Netbook computers spark corporate interest
  8. Conficker, the Internet's No.1 threat, gets an update
  9. The implications of Skype's free software application for iPhone
  10. Fear and loathing in Windows 7: Testing Branch Cache using Linux
  11. Students learn through robot battles


Network World on Twitter: Get our tweets and stay plugged in to networking news


Network Management Solutions in your backyard.

Answers are as close as the IT Roadmap event in your area. You can ask questions, compare quotes, and gain a year's worth of direction in less than a day. Coming to 10 cities in '09 including Boston in May and Atlanta in June.
Qualify to attend free at http://www.nww.com/rpgx.jsp?c=XU1PHB1012Z4303.

IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment