Hackers exploit Google Wave's popularity Hackers are exploiting web users that were too late in signing up for Google Wave, says Symantec. SP 800-53 is essential for security in federal government IT systems SP 800-53 (Appendix H) provides two-way mappings between security controls defined in SP 800-53 and security controls defined in international security standard ISO/IEC 27001, Information Security Management Systems Put cybersecurity chief in DHS not the White House, Senator says Five months after President Obama announced the need for a White House-appointed coordinator to oversee national cybersecurity affairs, the debate continues in Washington over whether such a coordinator would be more effective if outside the White House. Microsoft 'neutered' UAC in Windows 7, says researcher A Sophos security official said that Microsoft went too far in cutting the security messages delivered in Windows 7 by "neutering" the User Account Control (UAC) feature. Fix Old Flaws to Stop New Attacks In further confirmation that Internet crooks tend to grab for the low-hanging fruit, a new Microsoft report reveals that the most common browser-based attacks tend to go after old software flaws. Making sure you've closed those holes can go a long way towards keeping your PC safe. Microsoft correctly predicts reliable exploits just 27% of the time Microsoft's monthly predictions about whether hackers will create reliable exploit code for its bugs were right only about a quarter of the time in the first half of 2009, the company acknowledged Monday. Microsoft Patch Tally: 6 Years, 745 Vulnerabilities In six years of monthly Patch Tuesdays, Microsoft has issued 400 security bulletins that address 745 vulnerabilities, an informal tally shows. eBay phishing scam scariest email blunder of 2009 The eBay email fraud campaign, which took place in May this year, and aimed to get users of the online auction site to disclose their bank details has been named this year's scariest email blunder by Proofpoint. Delayed Again: Red Flags Rule Deadline Now June 1, 2010 Bowing to Congressional pressure, the FTC is delaying enforcement of the Red Flags Rule until June 1, 2010, for financial institutions and creditors. Here, IT security pros weigh in on what the rule means for them. The core of risk management: It's the data! Over the past couple of weeks, I have had opportunities to sit down and talk with risk management professionals from two perspectives; analysis and data. From the analytical perspective, I spoke with risk management practitioners and, on the data side, it was data warehousing experts. The question I posed was given the events of the last 18 months, what is the one issue that confronts you today in evolving your risk practices? November giveaways Cisco Subnet is giving away free books on VMware vSphere security. Microsoft Subnet is giving away training from New Horizons and free books on Exchange Server 2010. Google Subnet is giving away free books on Android app development. Entry forms can be found on the main contest page. Trivia answers are revealed on each main Subnet page. Network World on Twitter? You bet we are |
No comments:
Post a Comment