Search This Blog

Wednesday, May 06, 2009

Parabon launches grid-based DDoS attack tests; Meet Francis V., a failed phisher

Holy Grail VMware bug: jump through a Windows VM and control the host
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Dell
rule

Enhance Performance, Security, Stability
Upgrading to the Windows Server 2008 OS can offer myriad advantages, including enhanced performance, security, and stability. By following best practices for in-place upgrades and taking advantage of tools such as the Dell Windows Server 2008 Readiness Advisor, administrators can help ensure a smooth migration on their Dell PowerEdge(TM) servers.

rule

Spotlight Story
Parabon launches grid-based DDoS attack tests

By Jaikumar Vijayan
Distributed denial of service (DDoS) attacks of the kind that crippled networks in Estonia two years ago are hard to defend against because they typically involve thousands of compromised computers knocking a Web site or server offline by simultaneously sending it torrents of useless traffic. Read full story

Related News:

Editor's note: We will be changing how we send out Network World newsletters over the next few weeks. To ensure future delivery of your newsletters, please add nww_newsletters@newsletters.networkworld.com to your e-mail address book or 66.186.127.216 to your white-list file. Thank you.

Meet Francis V., a failed phisher The subject line alone was enough to unmask this criminal mastermind: "This message it is confidential." ... This message it is really not from the IRS.

Holy Grail VMware bug: jump through a Windows VM and control the host A critical vulnerability in the virtual machine display function might allow a guest operating system to run code on the host via a bug that affects just about all of VMware products, including Fusion and ESX. This is of course the Holy Grail for any VM attacker and the worst-case scenario for the host VM owner. If this bug were exploited, it would allow an attacker to jump out of say a Windows XP VM instance down to your HOST system, say Mac OSX or Windows XP.

Security: The ugly business Security is an ugly business because when you have a problem there's rarely an elegant, straightforward solution. What you usually wind up with is a solution that's just "good enough." I recently learned of a great example that nicely illustrates this point.

McAfee reports huge drop in spam Spam has dropped noticeably so far this year, according to McAfee's Threat Report for the First Quarter of 2009, which says spam volumes were 20% lower for this quarter compared to the same quarter in 2008 and 30% lower than in the third quarter of last year when they reached their peak.

Policy issues surrounding U.S. government mounting cyberattacks NRC report deals with policy issues of the United States mounting cyberattacks on bad guys, other countries.

Keeping on top of security trends Cisco Subnet blogger Scott Hogg shares some of the key industry analysis on security trends to help you stay on top of the ever-evolving security threat landscape.

Using offshore certified Microsoft partners? Beware of security holes Microsoft Subnet was last week contacted by a reader from Croatia who was shocked to discover a gaping security hole in a product being sold worldwide by one of the country's premier Microsoft partners.

CCNS Security ... What's required Cisco Subnet blogger Michael Watkins outlines what's involved in obtaining a CCNA Security certificate -- and where it might lead.

CCIE R/S troubleshooting returns Cisco Subnet blogger Wendell Odom says it's official: Oct. 18 begins the new era with the return of troubleshooting for the CCIE R/S lab.

Privacy worries grow over wireless monitoring devices The wireless industry is abuzz with plans for expanding remote monitoring of just about any device over wireless networks.

Wireless networks must overcome interference, latency and security challenges Wireless networks bring flexibility but interference, latency and security issues are often obstacles that come with them, too.

May Giveaways
Cisco Subnet
, Microsoft Subnet and Google Subnet are collectively giving away books on Google Apps Deciphered, the CCNA Security exam, an awesome SQL Server 2005/2008 training video and the grand prize, a Microsoft training course from New Horizons worth up to $2,500. Deadline for entries May 31.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Evolution of Ethernet
Evolution of Ethernet From 3Mbps over shared coax to 40/100Gbps over fiber…and beyond.

Apple iPhoneys: The 4G edition
Apple iPhoneys: The 4G editioniPhone enthusiasts from around the Web offer their visions for the next-gen iPhone.

Sponsored by Dell
rule

Enhance Performance, Security, Stability
Upgrading to the Windows Server 2008 OS can offer myriad advantages, including enhanced performance, security, and stability. By following best practices for in-place upgrades and taking advantage of tools such as the Dell Windows Server 2008 Readiness Advisor, administrators can help ensure a smooth migration on their Dell PowerEdge(TM) servers.

rule

EMA: Refining privilege access security.
Close the security gaps in high-privilege access control and authentication by selecting the right security products for the job. This whitepaper, "Resolving the Privilege Management Paradox," details how. EMA outlines how to find products that offer strong shared access management, better control and clear visibility and multifactor authentication.
Click to download.


Everybody says "Do more with less!"
But no one tells you how. We will and it costs nothing to find out at IT Roadmap Conference and Expo. Coming to 10 cities in 09.
Register now, attend free

 

05/06/09

Today's most-read stories:

  1. Death of the mouse
  2. Illinois programmer sues Google over "Android"
  3. RIM to bind BlackBerry to Cisco phones
  4. Use the Cisco restroom at your own risk
  5. Juniper bolsters branch router, switch lines
  6. Botnet probe turns up 70G bytes of personal, financial data
  7. Why mix Bluetooth with Wi-Fi?
  8. Is it time to cut the Ethernet access cable?
  9. It takes a village idiot: The jerks of online forums
  10. Some IT skills see pay hikes during downturn
  11. Notebook replaces trackpad with LCD panel


Network World on Twitter: Get our tweets and stay plugged in to networking news


Metzler: 2009 Handbook of Application Delivery
Successful IT organizations must know how to make the right application delivery decisions in these tough economic times. This handbook authored by WAN expert Jim Metzler will help guide you.
Download now



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: