Search This Blog

Wednesday, November 04, 2009

Worms back at top of Microsoft threat list

Microsoft re-patches last month's critical IE update; The Risk-Free Cloud
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by Qualys
rule

Vulnerability Management Checklist
Discover the 12 key decision points you need to consider when choosing a vulnerability management solution. This checklist walks you step-by-step through critical questions to ensure you select the solution that will best protect your network and data.

Learn more now.

rule

Spotlight Story
Worms back at top of Microsoft threat list

Long dismissed as a security scare of the past, Internet worms appear to have made a strong comeback, jumping to take the top two places on Microsoft's latest threat list. Read full story

Related News:

Microsoft re-patches last month's critical IE update
Microsoft on Monday re-patched Internet Explorer, the third time it's been forced to repair one of the updates delivered in its largest-ever bug fix, which was delivered on Oct. 13.

The Risk-Free Cloud
There is so much waste in the data centers of Fortune 1000 companies today that a CIO – as an officer of the company – could be considered in breach of their fiduciary duty to stockholders given the dollars in question.  Of course that requires costs transparency, so sadly most are safe for now.  It seems that every new technology innovation brings the promise of greater efficiencies and cost...

Firewall upgrade tames nasty Flash games
The nuisance posed by Flash-based games and Internet viral advertising is now so significant that security vendor SmoothWall has decided to offer a web filter capable of 'intelligently' blocking the application.

McAfee: P2P sites on the rise
The number of peer-to-peer (p2p) websites that allow users to share copyrighted materials has increased, says McAfee.

Hackers exploit Google Wave's popularity
Hackers are exploiting web users that were too late in signing up for Google Wave, says Symantec.

E-voting system lets voters verify their ballots are counted
A new electronic voting system being used today for the first time in a government election in the U.S. allows voters and elections auditors in Takoma Park, Md. to go online and verify whether votes have been correctly recorded.

November giveaways
Cisco Subnet is giving away free books on VMware vSphere security. Microsoft Subnet is giving away training from New Horizons and free books on Exchange Server 2010. Google Subnet is giving away free books on Android app development. Entry forms can be found on the main contest page. Trivia answers are revealed on each main Subnet page.

Network World on Twitter? You bet we are


Ethernet everywhere!
Ethernet everywhereInside planes, trains, cars and spaceships, Ethernet is a morph master. Here's a look at some of Ethernet's cooler implementations.

7 tools to ease Windows 7 rollout
Windows 7These utilities help you plan, ensure app compatibility and manage images.

Identity Management E Guide
Identity management cannot be ignored – it is the key to preventing data breaches. This Network World Executive Guide provides in-depth information on today's most pressing security issues.
Read More


Webcast: When Good Applications Go Bad
Register today to hear Andrew Jaquith, Senior Analyst at Forrester Research, and Anthony James, VP Products at Fortinet, discuss the challenges posed to enterprises by application security threats. Additionally, hear a customer testimonial on how CKE Restaurants, responsible for operating many of the USA's most popular quick-service and fast-casual dining restaurants, reduced the risk of application-borne threats.
Register now.

 

November 04, 2009

MOST-READ STORIES

  1. Microsoft takes shot at Google Apps
  2. Tone-deaf Unisys official on why cloud computing rocks
  3. The Cisco squeeze
  4. After one year, Conficker infects 7 million computers
  5. Verizon Droid FAQ: What we know so far
  6. These 12 gadgets let you cut the cord for good
  7. Cisco's data center guru talks direction, strategy
  8. Sprint launches netbook deal, expands WiMAX coverage
  9. IPhone cellular unlock promised by hacker this week
  10. Cisco lays out why it might let Tandberg go free

Why Small Companies Should Think Outside Box for Protecting Endpoints
In their "Sector Insight" study, Aberdeen Group investigated the considerations small business should take when selecting anti-malware solutions. Read this paper to learn why Aberdeen recommends small enterprises be open to endpoint security solutions from vendors other than McAfee and Symantec.
Read Now



EMO Labs: Better Sound Through Innovation at DEMOfall 09

EMO Labs' Invisible Speaker innovation takes People's Choice Award top honors at DEMO conference.
Watch EMO Labs product launch.


 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments: