Search This Blog

Thursday, July 16, 2009

Patch Tuesday Fixes Serious Holes, Leaves Another Open

Shiny new Space Fence to monitor orbiting junk, satellites; PCI council publishes wireless security guidelines for payment cards
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile


Sponsored by Ultrium
rule

Keep Storage Costs in Check with Tape
The Clipper Group outlines the real costs of migrating to a disk-based storage. You will learn about the dramatic differences between tape-based and disk-based storage in regards to floor space, hardware and energy costs. Find out why tape storage, especially, LTO-4, should be part of your long-term storage plans.

rule

Spotlight Story
Patch Tuesday Fixes Serious Holes, Leaves Another Open

Microsoft today fixed a serious, under-attack flaw in a video ActiveX control, along with other critical flaws involving QuickTime files and fonts. But a critical zero-day hole in another ActiveX control remains unpatched. Read full story

Related News:

Shiny new Space Fence to monitor orbiting junk, satellites
The new Space Fence system will provide better accuracy and faster detection while allowing us to increase the number of satellites and other space objects that can be detected and tracked, thus avoiding collision and damage to other satellites,

PCI council publishes wireless security guidelines for payment cards
Any business accepting credit and debit cards -- and using or considering wireless LANs -- should carefully review the recommendations for use of 802.11 wireless access points that are detailed in the guidelines issued Wednesday by the Payment Card Industry Security Standards Council.

Latest malware trick: outsourcing quality assurance
Creators of Waledac malware enlisted the Conficker botnet as a tool to spread malware of their own, marking the first time Conficker was made available for hire, according to Cisco's mid-year security report. This was symptomatic of a wider trend Cisco noted of malware purveyors using established business practices to expand their illegal enterprises. Cisco likened the arrangement between Waledac and Conficker to a partner ecosystem, a term Cisco uses to describe its collaboration with other vendors.

Attacks against unpatched Microsoft bugs multiply
Attacks exploiting the latest Microsoft vulnerability are quickly growing in quantity and intensity, several security companies warned today as they rang alarms about the developing threat.

Oracle issues big security patch update
Oracle on Tuesday released its latest quarterly patch update, which includes 10 security fixes for its database and also addresses a range of vulnerabilities across the vendor's applications portfolio.

July Giveaways
Cisco Subnet is giving away 15 copies each of books on Enterprise Web 2.0 and Building a Greener Data Center; Microsoft Subnet is giving away training from New Horizons to one lucky reader and 15 copies of Microsoft SQL Server 2008 Reporting Services Unleashed. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages. Deadline for entries July 31.

Network World on Twitter? You bet we are


Botnet boom
BotnetsThe number of botnets has grown from about 1,500 two years ago to 3,500 today.

Summer of geeks
IT quizSpace camp! They Might Be Giants! Check out these and 9 other vacation options.

Next-Gen Firewalls Reduce Risk, Complexity, Cost
It's time to fix the firewall and re-establish it as the cornerstone of enterprise network security. Discover how the next generation of firewalls increases visibility and control, and reduces risk. See how this new breed streamlines and simplifies an infrastructure, resulting in reduced complexity and cost.
Click here.


 

July 16, 2009

TOP STORIES | MOST DUGG STORIES

  1. Best Buy calls Twitter a job qualification
  2. Eight real-life robots that could kill us all
  3. How to use electrical outlets and cheap lasers to steal data
  4. Invisible IPv6 traffic poses serious network threat
  5. Cisco expected to guillotine more employees this Thursday
  6. Test: Best hypervisors for the desktop
  7. 11 security companies to watch
  8. Cisco multimillionaire goes broke, loses $300 million fortune
  9. Google opens attack on Lotus Notes install base
  10. How many Twitter followers does it take to get a job?

Does Your Business Have a Continuity Network Plan?
An emergency can occur at any time that can result in entire regions or groups of people being isolated for an extended period of time. Is your business ready for continued operations and productivity in the case of an unplanned event? In this webcast you'll hear how to prepare the network now to seamlessly continue business operations during a major crisis, as well as a case study of an organization that has implemented a business continuity network plan.
Learn more now.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: