Editor's note: We will be changing how we send out Network World newsletters over the next few weeks. To ensure future delivery of your newsletters, please add nww_newsletters@newsletters.networkworld.com to your e-mail address book or 66.186.127.216 to your white-list file. Thank you. Meet Francis V., a failed phisher The subject line alone was enough to unmask this criminal mastermind: "This message it is confidential." ... This message it is really not from the IRS. Holy Grail VMware bug: jump through a Windows VM and control the host A critical vulnerability in the virtual machine display function might allow a guest operating system to run code on the host via a bug that affects just about all of VMware products, including Fusion and ESX. This is of course the Holy Grail for any VM attacker and the worst-case scenario for the host VM owner. If this bug were exploited, it would allow an attacker to jump out of say a Windows XP VM instance down to your HOST system, say Mac OSX or Windows XP. Security: The ugly business Security is an ugly business because when you have a problem there's rarely an elegant, straightforward solution. What you usually wind up with is a solution that's just "good enough." I recently learned of a great example that nicely illustrates this point. McAfee reports huge drop in spam Spam has dropped noticeably so far this year, according to McAfee's Threat Report for the First Quarter of 2009, which says spam volumes were 20% lower for this quarter compared to the same quarter in 2008 and 30% lower than in the third quarter of last year when they reached their peak. Policy issues surrounding U.S. government mounting cyberattacks NRC report deals with policy issues of the United States mounting cyberattacks on bad guys, other countries. Keeping on top of security trends Cisco Subnet blogger Scott Hogg shares some of the key industry analysis on security trends to help you stay on top of the ever-evolving security threat landscape. Using offshore certified Microsoft partners? Beware of security holes Microsoft Subnet was last week contacted by a reader from Croatia who was shocked to discover a gaping security hole in a product being sold worldwide by one of the country's premier Microsoft partners. CCNS Security ... What's required Cisco Subnet blogger Michael Watkins outlines what's involved in obtaining a CCNA Security certificate -- and where it might lead. CCIE R/S troubleshooting returns Cisco Subnet blogger Wendell Odom says it's official: Oct. 18 begins the new era with the return of troubleshooting for the CCIE R/S lab. Privacy worries grow over wireless monitoring devices The wireless industry is abuzz with plans for expanding remote monitoring of just about any device over wireless networks. Wireless networks must overcome interference, latency and security challenges Wireless networks bring flexibility but interference, latency and security issues are often obstacles that come with them, too. May Giveaways Cisco Subnet, Microsoft Subnet and Google Subnet are collectively giving away books on Google Apps Deciphered, the CCNA Security exam, an awesome SQL Server 2005/2008 training video and the grand prize, a Microsoft training course from New Horizons worth up to $2,500. Deadline for entries May 31. Network World on Twitter Get our tweets and stay plugged in to networking news. |
No comments:
Post a Comment