Search This Blog

Wednesday, November 11, 2009

Apple delivers mammoth update, patches 58 bugs

How a Botnet Gets Its Name; Swarms of networked robots to probe the ocean
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by Websense, Inc.
rule

Research Highlights Advantages of SaaS for Security
How can your organization keep up with an ever-changing threat landscape and still meet budgets? It's simple - Software as a Service (SaaS). Download this complimentary "Advantages of a Hosted Security Model" white paper from Osterman Research to explore the true business benefits of hosted email and Web security.

Learn More Now

rule

Spotlight Story
Apple delivers mammoth update, patches 58 bugs

Apple patched 58 vulnerabilities in its Mac operating systems today, the most since May 2009, including several in the QuickTime media player that it had fixed separately in early September. Read full story

Related News:

How a Botnet Gets Its Name
There is a new kid in town in the world of botnets - isn't there always? A heavyweight spamming botnet known as Festi has only been tracked by researchers with Message Labs Intelligence since August, but is already responsible for approximately 5 percent of all global spam (around 2.5 billion spam emails per day), according to Paul Wood, senior analyst with Messagelabs, which keeps tabs on spam and botnet activity.

Swarms of networked robots to probe the ocean
Swarms of robots will soon be scooting across the ocean floor looking to monitor everything from protected marine areas and fish migration patterns to  a variety of other biological activities. 

Online users becoming less anxious over security, privacy
While surveys about security usually end up telling us about how bad people feel, a global survey released Tuesday indicates there's substantially less anxiety about Internet security, personal safety and national security than there was six months ago.

Security pros seek hacking, forensics skills
The Computing Technology Industry Association of 1,500 IT workers found that majority intend to pursue security and related certifications in the coming years.

Internet battlefield program marshals NATO forces
Getting military forces from different nations to work together in Afghanistan is no easy task, but before multinational troops with the North Atlantic Treaty Organization arrive there, officers and others are often trained through an online Battle Labs computer simulation via the Internet.

Drowning in Passwords: Tips to Stay Safe and Sane
Another day, another password: Thanks to Web-based apps, we're all acquiring passwords at quite a clip. How do you remember them all while staying secure? Here are some helpful tools and strategies -- that don't involve writing your passwords on sticky notes.

Can we block all IPv6 tunnels in our enterprise network?
A major IPv4 to IPv6 transition technique is the use of tunnels; this is encapsulating IPv6 packets into IPv4 packets that can then be transported over the IPv4-only parts of the Internet. Those tunnels can also be used within the enterprise network either on purpose (for example to traverse some legacy network devices not supporting IPv6) or not on purpose...

Patch Tuesday: Six expected patches, two surprise revised ones
As expected, Microsoft's November Patch Tuesday consists of six updates, three critical, that fix 15 holes. The company also re-released two more patches, both critical Here is the low-down, provided by Microsoft, of each new patch issued today:

November giveaways
Cisco Subnet is giving away free books on VMware vSphere security. Microsoft Subnet is giving away training from New Horizons and free books on Exchange Server 2010. Google Subnet is giving away free books on Android app development. Entry forms can be found on the main contest page. Trivia answers are revealed on each main Subnet page.

Network World on Twitter? You bet we are


Ethernet everywhere!
Ethernet everywhereInside planes, trains, cars and spaceships, Ethernet is a morph master. Here's a look at some of Ethernet's cooler implementations.

7 tools to ease Windows 7 rollout
Windows 7These utilities help you plan, ensure app compatibility and manage images.

Effectively Integrating Wireline and Wireless Services for Seamless Communication
Respected consulting firm IDC examines the benefits, challenges and the choices available today that will allow you to successfully bridge your wireless and wireline services. Find out how you can simplify your communications strategy, save money and create a transparent environment.
Learn more


Closing the Risk Gap in Privileged Access Control
In this whitepaper, Enterprise Management Associates (EMA) examines this critical issue in IT security administration in light of the BeyondTrust approach to helping businesses move from a trust-based system to a secure, auditable process in order to provide a higher standard of control and better support for regulatory compliance.
Click here to read more!

 

November 11, 2009

MOST-READ STORIES

  1. Priceless! The 25 funniest vintage tech ads
  2. Cisco warns UC users of limited support for Windows 7
  3. Open source software ready for big business
  4. Father of SIP bolts Cisco for Skype
  5. 10 stunning 3D buildings made with Google SketchUp
  6. Lamp hijacks electricity from unused telephone jacks
  7. First iPhone worm spreads Rick Astley wallpaper
  8. Cisco doubles down on collaboration with 61 new products
  9. Is the Cisco MARS mission going to abort?
  10. Apple delivers mammoth update; patches 58 bugs

The Importance of Measuring Power in Your Data Center
Historically, IT managers worried little about power consumption. This has quickly changed due to limits in power availability, the cost of power and companies' green initiatives. This white paper explores why and where power should be measured, what to do once data is gathered, and emerging new technologies.
Read More.



EMO Labs: Better Sound Through Innovation at DEMOfall 09

EMO Labs' Invisible Speaker innovation takes People's Choice Award top honors at DEMO conference.
Watch EMO Labs product launch.


 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments: