Thursday, July 23, 2009

America's 10 most wanted botnets

Adobe Flash vulnerability allows attack via malicious PDF file; Got something to hide? Try "Vanish" to protect your privacy
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile


Sponsored by Xythos
rule

Document Management 2.0
Web enabled ECM solutions that focus on business needs are the most likely to put organizations in a better position to address enhanced security requirements and provide long-lasting cost-savings benefits. This whitepaper explores important areas to consider in how organizations conduct business and the way they manage critical content, documents and files in the digital age.

rule

Spotlight Story
America's 10 most wanted botnets

Ranked by size and strength, these are the 10 most damaging botnets in the U.S. Read full story

Related News:

Adobe Flash vulnerability allows attack via malicious PDF file

Got something to hide? Try "Vanish" to protect your privacy
Not that I have anything to hide, but I decided to give the University of Washington's new e-mail disappearing tool, dubbed Vanish, a whirl anyway.

DNS security, net neutrality up for debate at IETF meeting
Standards body IETF will tackle the Internet's toughest problems, including DNS security, IPv6 adoption and network neutrality, at its Stockholm meeting next week

July Giveaways
Cisco Subnet is giving away 15 copies each of books on Enterprise Web 2.0 and Building a Greener Data Center; Microsoft Subnet is giving away training from New Horizons to one lucky reader and 15 copies of Microsoft SQL Server 2008 Reporting Services Unleashed. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages. Deadline for entries July 31.

Network World on Twitter? You bet we are


Botnet boom
BotnetsThe number of botnets has grown from about 1,500 two years ago to 3,500 today.

Watch this space
IT quizHere are 11 security companies to watch.

Why a Firewall Sandwich?
Enterprise security through Web security, messaging security and gateway security is the only way to protect your network from intruders, identity theft, security compromises, legal liability, malware, hackers and viruses. Find out about advanced methods of firewall security that will create a "firewall sandwich" and ensure the highest level of protection.
Click here to continue.


 

July 23, 2009

TOP STORIES | MOST DUGG STORIES

  1. Microsoft stuns Linux world, submits source code for kernel
  2. Five technologies Iran is using to censor the Web
  3. Adobe admits users vulnerable after downloading Reader
  4. ZerO1's mobile offer may be too good to be true
  5. Why would Microsoft patent a 'butt hinge with butt straps?'
  6. Google Earth now takes you to the moon
  7. Avaya set to buy Nortel enterprise business for $475 million
  8. IBM strikes OEM deal to resell Juniper Ethernet switches, routers
  9. Juniper pounds spike into Cisco's heart
  10. IEEE 802.11n heads for a finish in September

New Data Protection Strategies
As the demands for data capacity and higher service levels grow, protecting corporate data becomes more challenging. Continuous Data Protection, as discussed in this white paper by Evaluator Group and IBM, can cost-effectively improve security with minimal impact to business.
Learn More



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment