Search This Blog

Friday, September 18, 2009

IE security hole lingers; Skype founders sue eBay: What's going on?

Skype Founders Sue eBay: What's Going On?; Curious George's latest mischief: malware
Network World logo

Daily News AM Alert

NetworkWorld.com | Update Your Profile


Sponsored by Sun Microsystems
rule

Storage made simple, just when you need it most.
Storage made simple, just when you need it most. Learn how to utilize Sun Storage Systems at a fraction of the cost.

Learn More Now

rule

Spotlight Story
Microsoft Internet Explorer SSL security hole lingers

A Microsoft Internet Explorer weakness in its SSL implementation leaves an opening for attackers to steal information being sent via SSL. Apple's Safari for Windows browser has same problem but Safari for Mac, Firefox and Opera have fixed the trouble. Read full story

Related News:

Skype Founders Sue eBay: What's Going On?
The founders of Skype are suing eBay for copyright infringement, a move that could block eBay's deal to sell a majority stake in Skype to a group of private investors for $1.9 billion.

Curious George's latest mischief: malware
The Public Broadcasting System's Web site has been infected at a section related to the Curious George children's TV show and when the fake authentication page doesn't work for the user, tries to drop malware on them, researchers said Thursday.

Cisco looking to recoup share losses
Cisco management has a "renewed focus" on regaining market share lost this calendar year and in Cisco's fiscal 2009, reports investment firm UBS. UBS issued a bulletin this week recapping highlights of a recent meeting its analysts had with Cisco management.

Cerf: Turning off pieces of the 'Net 'not sensible'
In an exclusive interview, the Internet 'father' explains how he helped commercialize the Web and what he's doing now at Google.

Nortel users should hope for best, prepare for worst
Users should chart the progress of Avaya's purchase of Nortel's enterprise assets carefully, so that they are spared any unpleasant product integration or rationalization surprises.

Sophisticated botnet causing a surge in click fraud
A new botnet has caused a sharp spike in click fraud because it is skirting the most sophisticated filters of search engines, Web publishers and ad networks, according to Click Forensics.

FCC pledges public safety spectrum plan by February
Federal Communications Chairman Julius Genachowski told Congress today that a new plan for auctioning off part of the 700Mhz spectrum band for public safety would come by this coming February.

Chris Shipley looks ahead (DEMOfall 09), looks back
On the eve of her 24th DEMO show (next week's DEMOfall 09), Chris Shipley chats with Keith Shaw about some of the trends to expect at next week's event, as well as a look back at 13 years of DEMO shows, including the company that almost appeared at DEMO (hint: it rhymes with OooTube). (21:13)

Vote for the best Cisco NetFlow hip-hop video on YouTube
Plixer's Mix Master Mitch has released his new Cisco NetFlow hip-hop video, professionally edited and produced. However, I like the homegrown look and feel of Mix Master Mitch's first Cisco NetFlow hip-hop video.

Rumored Apple Tablet to sport 9.6-inch screen, will cost between $800 and $1000, and might run on AT&T's network
If there's one thing we learned about Apple in the past few weeks, it's that it won't hesitate to pull a feature or a product at the very last minute if it isn't up to Apple's high standards. I'm of course referring to the latest iPod Touch models, which contrary to what was anticipated, did not come equipped with built-in cameras due to a reported higher than acceptable failure rate.

10 in IPv6 Does Not Equal 10 in IPv4
I encountered a funny situation this past week while deploying IPv6 on a tunnel interface. I realized that when you use 10 for the most significant digits in an IPv6 address it does not mean that is the tenth address in that network.

Microsoft Subnet is giving away training from New Horizons and 15 copies of Windows Server 2008 How-To. Cisco Subnet is giving away 15 copies of Interconnecting Data Centers Using VPLS. Google Subnet is hosting many new bloggers (watch for giveaway information soon.) Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


The history of steganography
SteganographyThere is a wealth of methods for creating encrypted messages you can't even tell are there.

Top 10 cool satellite projects
SatellitesSatellites are, by their very definition, cool.

Staying a step ahead of the hackers
Security managers may work for midsize or large organizations; they may operate from anywhere on the globe. But inevitably, they share a common goal: to better manage the risks associated with their business infrastructure. Increasingly, Web application security plays a significant role in achieving that goal.
Learn More


Live Webcast: The Benefits of Integrated IPS
If a traditional distributed Intrusion Prevention System seems too complex then integrated IPS everywhere might be the right strategy for you. The benefits will be discussed during this Live Webcast, Thursday, September 29, 1:00 p.m. EST/10 a.m. PST. Get IPS deployment best practices and tips on selecting the right operational tools.
Register now.

 

September 18, 2009

MOST-READ STORIES

  1. 10G Ethernet shakes net design to the core
  2. First look: Google Chrome 3.0
  3. Tech's worst year ever?
  4. T-Mobile backs off plan to charge $1.50 for paper bill
  5. Cubicles gone wild: 13 wacky workspaces
  6. HP extends data center, campus Ethernet switches
  7. Android 1.6 SDK arrives as Google platform gains traction
  8. Security disaster averted by financial firm's quick actions
  9. Apple betrays the iPhone's business hopes
  10. Send large files via Yahoo Mail

Live Event: Enterprise Database Security
Make the most of your existing resources without draining your IT budget with a successful database security strategy. Join Industry experts, including Noel Yuhanna, Principal Analyst at Forrester Research for this live event scheduled for Thursday, September 24 at 2 p.m. ET / 11 a.m. PT to learn how. Protect your enterprise assets and ensure regulatory compliance.
Register for this Live Event now.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: