Friday, November 06, 2009

MS Security Architect: Windows 7 Will Slash Malware

Hackers exploit Google Wave's popularity; SP 800-53 is essential for security in federal government IT systems
Network World logo

Compliance Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by Netcordia
rule

The Importance of PCI DSS Compliance
The greatest challenge to PCI DSS compliance resides in monitoring and managing all its specific network requirements, which encompass security firewalls, access and change controls, system updates, configuration changes and testing procedures. Learn how to ensure that your organization achieves and maintains compliance.

Learn more

rule

Spotlight Story
MS Security Architect: Windows 7 Will Slash Malware

Jimmy Kuo, principal architect for Microsoft's Malware Protection Center, has high hopes that Windows 7 security features will help reverse attack trends identified in the seventh volume of the software giant's Security Intelligence Report. Read full story

Related News:

Hackers exploit Google Wave's popularity
Hackers are exploiting web users that were too late in signing up for Google Wave, says Symantec.

SP 800-53 is essential for security in federal government IT systems
SP 800-53 (Appendix H) provides two-way mappings between security controls defined in SP 800-53 and security controls defined in international security standard ISO/IEC 27001, Information Security Management Systems

Put cybersecurity chief in DHS not the White House, Senator says
Five months after President Obama announced the need for a White House-appointed coordinator to oversee national cybersecurity affairs, the debate continues in Washington over whether such a coordinator would be more effective if outside the White House.

Microsoft 'neutered' UAC in Windows 7, says researcher
A Sophos security official said that Microsoft went too far in cutting the security messages delivered in Windows 7 by "neutering" the User Account Control (UAC) feature.

Fix Old Flaws to Stop New Attacks
In further confirmation that Internet crooks tend to grab for the low-hanging fruit, a new Microsoft report reveals that the most common browser-based attacks tend to go after old software flaws. Making sure you've closed those holes can go a long way towards keeping your PC safe.

Microsoft correctly predicts reliable exploits just 27% of the time
Microsoft's monthly predictions about whether hackers will create reliable exploit code for its bugs were right only about a quarter of the time in the first half of 2009, the company acknowledged Monday.

Microsoft Patch Tally: 6 Years, 745 Vulnerabilities
In six years of monthly Patch Tuesdays, Microsoft has issued 400 security bulletins that address 745 vulnerabilities, an informal tally shows.

eBay phishing scam scariest email blunder of 2009
The eBay email fraud campaign, which took place in May this year, and aimed to get users of the online auction site to disclose their bank details has been named this year's scariest email blunder by Proofpoint.

Delayed Again: Red Flags Rule Deadline Now June 1, 2010
Bowing to Congressional pressure, the FTC is delaying enforcement of the Red Flags Rule until June 1, 2010, for financial institutions and creditors. Here, IT security pros weigh in on what the rule means for them.

The core of risk management: It's the data!
Over the past couple of weeks, I have had opportunities to sit down and talk with risk management professionals from two perspectives; analysis and data. From the analytical perspective, I spoke with risk management practitioners and, on the data side, it was data warehousing experts. The question I posed was given the events of the last 18 months, what is the one issue that confronts you today in evolving your risk practices?

November giveaways
Cisco Subnet is giving away free books on VMware vSphere security. Microsoft Subnet is giving away training from New Horizons and free books on Exchange Server 2010. Google Subnet is giving away free books on Android app development. Entry forms can be found on the main contest page. Trivia answers are revealed on each main Subnet page.

Network World on Twitter? You bet we are


Ethernet everywhere!
Ethernet everywhereInside planes, trains, cars and spaceships, Ethernet is a morph master. Here's a look at some of Ethernet's cooler implementations.

7 tools to ease Windows 7 rollout
Windows 7These utilities help you plan, ensure app compatibility and manage images.

The Executive Guide to Data Loss Prevention
Independent, objective research that examines the business justification for implementing DLP solutions and outlines the resource requirements to successfully deploy DLP in an enterprise. Data loss prevention (DLP) technology has never been more important. To that end, we've developed tools to help guide organizations considering DLP technologies.
Read more.


The Importance of Measuring Power in Your Data Center
Historically, IT managers worried little about power consumption. This has quickly changed due to limits in power availability, the cost of power and companies' green initiatives. This white paper explores why and where power should be measured, what to do once data is gathered, and emerging new technologies.
Read More.

 

November 06, 2009

MOST-READ STORIES

  1. How a start-up failed to take supercomputing world by storm
  2. AT&T sues Verizon over TV ads
  3. Tone-deaf Unisys official on why cloud computing rocks
  4. Microsoft sets SQL Server 2008 R2 preview
  5. T-Mobile suffers another outage
  6. FBI warns of $100M cyber-threat to small business
  7. The Cisco squeeze
  8. Cisco, EMC unveil data center joint venture
  9. IBM executive accused of insider trading out of a job
  10. Why can't we do anything about spam?

When Pressing the Send Button Results In Compliance Violations
Protecting confidential data is serious business. Failure may result in fat fines and even jail time - not to mention damage to your brand. WatchGuard's easy-to-use, all-inclusive email and web secure content and threat prevention appliances offer a complete data protection solution.
Click here.



EMO Labs: Better Sound Through Innovation at DEMOfall 09

EMO Labs' Invisible Speaker innovation takes People's Choice Award top honors at DEMO conference.
Watch EMO Labs product launch.


 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments:

Post a Comment