Search This Blog

Friday, September 18, 2009

Microsoft Internet Explorer SSL security hole lingers

An Amazing Laptop Recovery Story; Fed cloud plan is wisely tempered by security concerns
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile


Sponsored by Oracle
rule

Live Event: Enterprise Database Security
Make the most of your existing resources without draining your IT budget with a successful database security strategy. Join Industry experts, including Noel Yuhanna, Principal Analyst at Forrester Research for this live event scheduled for Thursday, September 24 at 2 p.m. ET / 11 a.m. PT to learn how. Protect your enterprise assets and ensure regulatory compliance.

Register for this Live Event now.

rule

Spotlight Story
Microsoft Internet Explorer SSL security hole lingers

A Microsoft Internet Explorer weakness in its SSL implementation leaves an opening for attackers to steal information being sent via SSL. Apple's Safari for Windows browser has same problem but Safari for Mac, Firefox and Opera have fixed the trouble. Read full story

Related News:

An Amazing Laptop Recovery Story
This is a true story about sex, computers, the Internet, spying, theft, intrigue, and the police--and it all began this past February when David Krop made the mistake of leaving his two laptop computers inside a locked SUV in a parking garage.

Fed cloud plan is wisely tempered by security concerns
The federal CIO is pushing for government use of cloud services immediately, and the way he is going about it can teach a lesson to businesses struggling with how to use these services securely.

Google ReCAPTCHA acquisition latest in long line of buyouts
In light of Google's buyout this week of Carnegie Mellon University spinoff ReCAPTCHA, it seems like a good time to take a spin back through Google's more notable buyouts over the years. Wikipedia lists 55 of them, and given Google's sometimes mysterious ways, there are no doubt a few that didn't make the public list.

Security disaster averted by financial firm's quick actions
While most of the IT world has been spared a devasting security attack like Blaster and Sasser for the last few years, the damage wrought by all manner lesser-known computer viruses continues to inflict corporate pain.

Spam, malware dominate online user comments, Websense reports
A staggering 95% of all "user-generated comments" for blogs, chat rooms and message boards online are spam or malicious, according to a new Websense report on security threat trends.

New phishing attack chats up victims
With many who bank online now wary of phishing attacks, criminals are adding fake live-chat support windows to their Web sites to make them seem more real.

Attack E-mails Use Fake Shipping Confirmation Ruse
A triple-payload e-mail attack that uses a fake shipping confirmation notice with a supposed attached label is making the rounds, according to Webroot.

Microsoft Subnet is giving away training from New Horizons and 15 copies of Windows Server 2008 How-To. Cisco Subnet is giving away 15 copies of Interconnecting Data Centers Using VPLS. Google Subnet is hosting many new bloggers (watch for giveaway information soon.) Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


The history of steganography
SteganographyThere is a wealth of methods for creating encrypted messages you can't even tell are there.

Top 10 cool satellite projects
SatellitesSatellites are, by their very definition, cool.

Identity Management E Guide
Identity management cannot be ignored – it is the key to preventing data breaches. This Network World Executive Guide provides in-depth information on today's most pressing security issues.
Read More


Sophos Security Solution Center
With the threat landscape constantly changing, you need to have comprehensive protection that isn't complicated. With Sophos, you get complete protection for less investment. You get best-in-class threat protection, and data security and compliance that are simple and affordable so you can get more out of your existing security budget. Review timely resources at this Solution Center.
Visit this site today!

 

September 18, 2009

MOST-READ STORIES

  1. 10G Ethernet shakes net design to the core
  2. First look: Google Chrome 3.0
  3. Tech's worst year ever?
  4. T-Mobile backs off plan to charge $1.50 for paper bill
  5. Cubicles gone wild: 13 wacky workspaces
  6. HP extends data center, campus Ethernet switches
  7. Android 1.6 SDK arrives as Google platform gains traction
  8. Security disaster averted by financial firm's quick actions
  9. Apple betrays the iPhone's business hopes
  10. Send large files via Yahoo Mail

It's Easy to Win a Flat Screen
Security Directions: A Virtual Conference Presented by - CIO, Computerworld, CSO, InfoWorld & Network World. Join us for "Protecting Your Enterprise in a Dynamic Infrastructure" - a unique online security event. Listen to CSO publisher, Bob Bragdon and a panel of experts and users, to hear about real-world security deployments. And just for attending, you'll have a chance to win a flat screen LCD TV.
Register Now!



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: