Thursday, July 23, 2009

Solar storms have caused serious disruptions

America's 10 most wanted botnets; Lawmakers: Electric utilities ignore cyber warnings
Network World logo

Security Strategies Alert

NetworkWorld.com | Update Your Profile


Sponsored by Symark
rule

Controlling Access to Privileged Accounts
This white paper explores insider attacks and insider risk, and shows how to control them by controlling and monitoring access. The paper describes the more common vulnerabilities exploited by insider attacks and a method for assessing insider risk.

rule

Spotlight Story
Solar storms have caused serious disruptions

Power grids, airline flights and spacecraft have all fallen victim in the past to the fierce electromagnetic pulses from solar storms, exacting a heavy economic toll. Read full story

Related News:

America's 10 most wanted botnets
Ranked by size and strength, these are the 10 most damaging botnets in the U.S.

Lawmakers: Electric utilities ignore cyber warnings
The U.S. electrical grid remains vulnerable to cyber and electromagnetic pulse attacks despite years of warnings, several U.S. lawmakers say.

25% of firms suffer social-network phishing attacks
Cybercriminals are increasing the number of attacks on social networks, says Sophos.

Adobe Flash vulnerability also exploited in Web pages, says researcher
A vulnerability that Adobe has confirmed to exist in a number of its Reader, Flash Player and Acrobat products is being exploited through malicious Flash code in Web pages, according to one researcher.

Adobe promises patch for seven-month old Flash flaw
Adobe admitted its Flash and Reader software have a critical vulnerability and promised it would patch both next week.

Got something to hide? Try "Vanish" to protect your privacy
Not that I have anything to hide, but I decided to give the University of Washington's new e-mail disappearing tool, dubbed Vanish, a whirl anyway.

DNS security, net neutrality up for debate at IETF meeting
Standards body IETF will tackle the Internet's toughest problems, including DNS security, IPv6 adoption and network neutrality, at its Stockholm meeting next week

Feds may come up with cloud security standards
The federal government may step up with a set of cloud-security standards to meet government requirements for protecting sensitive data.

Mozilla denies new Firefox bug is security risk
Mozilla is denying that a bug that crashes Firefox 3.5 is a security flaw, countering earlier reports that the company's latest browser contained a vulnerability, even though it had just been patched.

July Giveaways
Cisco Subnet is giving away 15 copies each of books on Enterprise Web 2.0 and Building a Greener Data Center; Microsoft Subnet is giving away training from New Horizons to one lucky reader and 15 copies of Microsoft SQL Server 2008 Reporting Services Unleashed. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages. Deadline for entries July 31.

Network World on Twitter? You bet we are


Botnet boom
BotnetsThe number of botnets has grown from about 1,500 two years ago to 3,500 today.

Watch this space
IT quizHere are 11 security companies to watch.

Web-based Collaboration and the Road to Compliance
Web enabled ECM solutions that focus on business needs are the most likely to put organizations in a better position to address enhanced security requirements and provide long-lasting cost-savings benefits. This whitepaper explores important areas to consider in how organizations conduct business and the way they manage critical content, documents and files in the digital age.
Learn more now.


 

July 23, 2009

TOP STORIES | MOST DUGG STORIES

  1. Microsoft stuns Linux world, submits source code for kernel
  2. Five technologies Iran is using to censor the Web
  3. Adobe admits users vulnerable after downloading Reader
  4. ZerO1's mobile offer may be too good to be true
  5. Why would Microsoft patent a 'butt hinge with butt straps?'
  6. Google Earth now takes you to the moon
  7. Avaya set to buy Nortel enterprise business for $475 million
  8. IBM strikes OEM deal to resell Juniper Ethernet switches, routers
  9. Juniper pounds spike into Cisco's heart
  10. IEEE 802.11n heads for a finish in September

Addressing the Complexities of Remote Data Protection
Data protection and recovery can be a complicated problem in remote offices. But there are options. This white paper explores a range of possibilities, and shows how an adaptive data protection solution can protect remotely stored data for enterprises of all sizes.
Read More



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment