Friday, December 11, 2009

Will U.S. Supreme Court overhaul Sarbanes-Oxley?; Facebook privacy changes draw mixed reviews

Facebook privacy changes draw mixed reviews; Products of the week slideshow
Network World logo

Compliance Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by IBM
rule

Improve Web Application Security
During challenging financial times cybercriminals find new ways to exploit vulnerable IT systems for profit. A recent global CIO study estimated that theft from cybercrime cost businesses as much as $1tr in 2008. Securing web applications has never been more important. IBM Rational AppScan helps to automate Web application security and compliance analysis. Try it yourself for free.

Learn More Now

rule

Spotlight Story
Will U.S. Supreme Court overhaul Sarbanes-Oxley?

The U.S. Supreme Court will hear arguments for and against the legitimacy of the Public Company Oversight Board, an independent group established by the Security and Exchange Commission to servers as the auditing industry's watchdog over financial practice and corporate governance. Read full story

Related News:

Facebook privacy changes draw mixed reviews
Facebook's revamped privacy settings will push more user data onto the Internet and, in some cases, make privacy protection harder for Facebook users, digital civil liberties experts said.

Products of the week slideshow
Our round-up of intriguing new products from 3Com, Sourcefire, BMC among others.

Hackers find a home in Amazon's EC2 cloud
Security researchers have spotted the Zeus botnet running an unauthorized command and control center on Amazon's EC2 cloud computing infrastructure.

Lack of Telework Preparedness Threatens Business Continuity
Research from Telework Exchange finds organizations expect employees to work from home in a pandemic, yet don't provide adequate resources

Microsoft talks cloud computing security, plans to offer private cloud software
Microsoft is looking to unveil a new security structure for multi-tenant cloud environments as well as private cloud software based on the same technology used to build the Azure cloud computing platform.

H4ck3rs are people too: Film review
During the 1990s, the term "hacker" became synonymous with "cracker," which is a person who performs some form of computer sabotage. The association is understandable. In order to be an effective cracker, you had to be a good hacker, thus the terms got intertwined, and hacker won out in the popular press.

Symantec security, storage offerings now on Amazon's EC2
Businesses looking at using Amazon's Elastic Compute Cloud (EC2) for pay-as-you-go servers can now add Symantec security, backup and storage protection.

TSA posts document on airport screening procedures online
In a gaffe called "shocking" and "reckless" by some U.S. lawmakers, the Transportation Security Administration inadvertently posted online a 93-page document containing highly sensitive information on airport screening procedures.

Guard Your Online Privacy With Firefox Addon
As you browse the Web, Web sites watch you. Information is gathered about you, potentially shared with others, and possibly kept for a very long time. Which sites gather this information and which don't...and what do they do with the information? There's no practical way to know--unless you use TrackerWatcher, that is. This excellent, free Firefox add-on checks the privacy tracking features of Web sites you visit, and reports the results to you in great detail.

Report predicts rise of self-defending botnets
The world is not only losing the war against spam, the situation might be about to get a whole lot worse with the emergence of a new type of automatic botnet able to thrive without direct human control, Symantec's MessageLabs division has warned.

NASA satellite; NSF telescope go on great space hunt
They are taking two radically different approaches but NASA and the National Science Foundation (NSF) are prepping to significantly alter the way scientists explore space.

Adobe fixes critical Flash Player flaws
Adobe on Tuesday patched seven vulnerabilities in Flash Player, six of them for critical bugs that hackers could use to hijack Windows, Mac or Linux machines.

Social network and banking scams are on the rise, says Cisco
What do phishing, instant messaging malware, DDoS attacks and 419 scams have in common? According to Cisco Systems, they're all has-been cybercrimes that were supplanted by slicker, more menacing forms of cybercrime over the past year.

McAfee appliance watches for network threats
McAfee Tuesday unveiled a security appliance designed to monitor internal corporate traffic flows for worms, viruses and botnet activity in order to block outbreaks traced to corporate computers.

How to fight malware
Tests of five Web security gateways reveal that performing inline inspection of network traffic is a must, as is querying cloud-based databases of the latest malware. The current crop of anti-malware tools offers strong protection against spam, spyware, phishing, botnets, rootkits, viruses and other Internet-borne attacks.

Cisco security survey:Cybercrime taking a page from business schools
Cybercriminals are getting more professional, adopting classic business structures in the development and deployment of malware that is increasingly designed to reap maximum profit, according to the annual Cisco security report.

Microsoft patches 12 bugs, including IE8-only flaws
Microsoft today patched 12 vulnerabilities in Windows, Office and Internet Explorer, including three critical bugs in the company's newest browser, IE8.

How to remove rootkits by hand
Manually removing rootkit-based malware can be extremely difficult. You can't delete the offending Registry entries because the malware process is running. You halt the malware process, but Windows restarts the malware before you can delete the Registry entries. Many rootkits also set the Registry entries' owner to someone other than the user, thus complicating things further.

New cloud-based service steals Wi-Fi passwords
For US$34, a new cloud-based hacking service can crack a WPA (Wi-Fi Protected Access) network password in just 20 minutes, its creator says.

Today from the Subnet communities

On Cisco Subnet: Happy 25th Anniversary, Cisco and Five Shortcuts to PCI Compliance; On Microsoft Subnet: everRun 2G: Keeps your applications highly available On Google Subnet: Google adds discussion forums, e-mail lists to Google Apps

Network World on Twitter? You bet we are


Ethernet everywhere!
Ethernet everywhereInside planes, trains, cars and spaceships, Ethernet is a morph master. Here's a look at some of Ethernet's cooler implementations.

7 tools to ease Windows 7 rollout
Windows 7These utilities help you plan, ensure app compatibility and manage images.

FISMA Prescriptive Guide
Learn how Tripwire helps federal agencies, as well as the organizations and contractors that store, process or transmit federal information. The FISMA Prescriptive Guide contains case studies from three fictional federal agencies, each capturing the perspective of a key stakeholder in the FISMA compliance process.
Click here.


The Power of Virtualized Web Application Delivery
The increased dependency on Web applications has created greater complexity in the environment making availability, performance and security of Web applications an imperative. This white paper discusses how any size organization can tune its Web application delivery services with a virtualized solution that will meet the unique characteristics of each individual application.
Read More

 

December 11, 2009

MOST-READ STORIES

  1. Microsoft getting better at Patch Tuesday updates, experts say
  2. 13 of Microsoft's most important product releases for 2009
  3. Reasons not to buy Cisco
  4. Clearwire network down for hours in handlful of cities
  5. Hackers find a home in Amazon's EC2 cloud
  6. Network router cheat sheet
  7. Bots, bombs and weird science: The wackiest stories of 2009
  8. 802.11ac standard will bring gigabit speeds to Wi-Fi
  9. AT&T wireless chief defends 3G network
  10. 'Magic Quadrant' whiner just won't quit

Enabling HIPAA/HITECH Compliance
As healthcare organizations and vendors become more reliant on digital information, complying with increasing regulatory requirements presents challenges. This paper explores the requirements, best practices for implementing identity management systems that help ensure compliance, and Sun's simplified approach.
Learn More



EMO Labs: Better Sound Through Innovation at DEMOfall 09

EMO Labs' Invisible Speaker innovation takes People's Choice Award top honors at DEMO conference.
Watch EMO Labs product launch.


 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments:

Post a Comment