Friday, April 24, 2009

Why the Top U.S. Cyber Official is Losing Sleep; Windows bugs never really die

Cloud security stokes concerns at RSA; Researchers show how to take control of Windows 7
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Dell
rule

Why virtualization? Why now?
In this video, our speakers tackle these questions, explaining how virtualization technology has become more mainstream. Businesses are under pressure to ease management and reduce costs, while retaining and enhancing competitive advantages, such as flexibility, reliability, scalability and security. Watch now to see how virtualization can help address these demands.

rule

Spotlight Story
Why the Top U.S. Cyber Official is Losing Sleep

By Bill Brenner
The United States' top cybersecurity official already knew the world's digital infrastructure needed help before she took on a 60-day cyberspace policy review. With the review now complete, she admits the gravity of the situation seeps into her dreams and disturbs her sleep. Read full story

Related News:

Editor's note: We will be changing how we send out Network World newsletters over the next few weeks. To ensure future delivery of your newsletters, please add nww_newsletters@newsletters.networkworld.com to your e-mail address book or
66.186.127.216 to your white-list file. Thank you.

Windows bugs never really die Hackers can successfully attack Windows PCs months -- even years -- after Microsoft fixes a flaw, a security expert said Thursday, because there's always a pool of unpatched systems.

Forget computers, phone crime is worrying banks Computer fraud may be a big problem for banks today, but the telephone is becoming a critical tool for fraudsters, bank executives say.

Cloud security stokes concerns at RSA Two words — cloud security — dominated discussion and drove the action this week at RSA Conference 2009.

Has RSA Jumped the Shark? RSA Conference 2009 is still going on, but for me, the trip is just about over. I sit in the airport, trying to put the last few days in perspective.

U.S. lawmakers target deep packet inspection in privacy bill U.S. lawmakers plan to introduce privacy legislation that would limit how ISPs can track their users, despite reports that no U.S. ISPs are using such technologies except for legitimate security reasons.

Researchers show how to take control of Windows 7 Security researchers demonstrated how to take control of a computer running Microsoft's upcoming Windows 7 operating system at the Hack In The Box Security Conference (HITB) in Dubai on Thursday.

Rigged Word docs exploit 2008 bug, say researchers Attackers, probably based in China, are exploiting a December bug in Microsoft Word to hijack Windows PCs, Vietnamese security researchers warned Thursday.

FTC targets mobile text messaging, security concerns Looking to stay on top of rapidly developing security and privacy challenges in the mobile communications arena, the Federal Trade Commission this week released the results of a recent town hall meeting it held to help it grasp everything from open source software to data protection.

Click fraud rate dropped in Q1 Click fraud, a scam based on the highly profitable search advertising business, dipped in the first quarter after hitting an all-time high in the last three months of 2008.

Vendors release password cracking, management tools As full-disk encryption becomes increasingly used to protect data, new software tools that can recover lost passwords or change forgotten ones are being released.

Cloud computing a 'security nightmare,' says Cisco CEO If anyone has the right to be excited about cloud computing, it's John Chambers. But on Wednesday Cisco Systems' Chairman and CEO conceded that the computing industry's move to sell pay-as-you-go computing cycles available as a service on the Internet was also "a security nightmare."
Plus: From the blogosphere Cisco's Chambers painted a less-than-sunny view on cloud computing security at RSA.

AppLocker: New Name, Old Feature? Microsoft Subnet blogger Glenn Weadock found that there might be cool aspects of AppLocker that will become clearer as time progresses, but right now, it’s little more than a feature name change. He says “AppBlocker” would have been more accurate!

Day Three RSA 09: SHOWTIME! Any Paul McCartney and Wings fans out there? I really like their music although I think personally Paul McCartney is a real wanker. But man that wank can sure write some...

Top Trends: Patch Management Find out how patch-management products work, and what they can do for you, in this Product Guide.

April giveaways galore
Cisco Subnet
and Microsoft Subnet are giving away training courses from Global Knowledge, valued at $2,995 and $3,495, and have copies of three hot books up for grabs: CCVP CIPT2 Quick Reference by Anthony Sequeira, Microsoft Voice Unified Communications by Joe Schurman and Microsoft Office 2007 On Demand by Steve Johnson. Deadline for entries April 30.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Evolution of Ethernet
Evolution of Ethernet From 3Mbps over shared coax to 40/100Gbps over fiber…and beyond.

Apple iPhoneys: The 4G edition
Apple iPhoneys: The 4G editioniPhone enthusiasts from around the Web offer their visions for the next-gen iPhone.

Sponsored by Dell
rule

Why virtualization? Why now?
In this video, our speakers tackle these questions, explaining how virtualization technology has become more mainstream. Businesses are under pressure to ease management and reduce costs, while retaining and enhancing competitive advantages, such as flexibility, reliability, scalability and security. Watch now to see how virtualization can help address these demands.

rule

Cut Campus Network TCO by 50%.
Learn how to reduce your campus networks' TCO by up to 50% without compromising high performance, security or reliability. Juniper Networks shows you how to achieve unparalleled consistency, flexibility and efficiency for the lowest possible TCO.
Click here to register for this Live April 30 Webcast.


EMA: Refining privilege access security.
Close the security gaps in high-privilege access control and authentication by selecting the right security products for the job. This whitepaper, "Resolving the Privilege Management Paradox," details how. EMA outlines how to find products that offer strong shared access management, better control and clear visibility and multifactor authentication.
Click to download.

 

04/24/09

Today's most-read stories:

  1. The evolution of Ethernet
  2. Intel CPU cache poisoning: dangerously easy on Linux
  3. Apple reports blockbuster earnings with iPhone growth
  4. Einstein systems to inspect U.S. government's Internet traffic
  5. Researchers show how to take control of Windows 7
  6. Apple yanks 'Baby Shaker' from App Store amidst public disgust
  7. 100 Gigabit Ethernet: Bridge to Terabit Ethernet
  8. Six things that could ruin Twitter (and five that won't)
  9. Apple iPhoneys: The 4G edition
  10. Good time to plan Windows 7, Office 2010 purchases
  11. VMware launchers vSphere


Network World on Twitter: Get our tweets and stay plugged in to networking news


Metzler: 2009 Handbook of Application Delivery
Successful IT organizations must know how to make the right application delivery decisions in these tough economic times. This handbook authored by WAN expert Jim Metzler will help guide you.
Download now



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment