Monday, January 25, 2010

Botnets: 'The Democratization of Espionage'

How will NASA defend Earth against killer asteroids and comets? | China hacks used as lure for more targeted attacks

Network World Security Alert

Forward this to a Friend >>>


Botnets: 'The Democratization of Espionage'
The cyber attacks against Google, Adobe and a raft of other top U.S. corporations late last year were by most accounts sophisticated and targeted attempts to steal proprietary data. But lost in all of the resulting media hoopla over who the remaining victims were and whether Chinese hackers or indeed the Chinese government itself were responsible is the simple, terrifying truth that individual hackers now have access to the same arsenal of cyber weapons once reserved only for nation states. Read More


WHITE PAPER: Trend Micro

Securing Virtualized Data Centers - ebook
The appeal of the cost savings, flexible capacity, and failover that virtualization enables is undeniable. The big question is can today's datacenter balance this increased flexibility with the need to maintain security policies and control over applications, along with the ability to prove compliance? This ebook provides the answers to critical virtualization security questions. Read Now

WHITE PAPER: Zscaler

How Hackers are Targeting Enterprise Users via Web 2.0 Browser Exploits
Securing enterprise servers with firewalls and intrusion detection is critical, but the most common threats are executed on thousands of mobile end users through the Web. Lean how to protect your clients with more than desktop anti-virus/anti-spyware and HIPS. Learn more!

How will NASA defend Earth against killer asteroids and comets?
Combinations of space- and ground-based telescopes may be the most economically palpable defenses NASA can mount against asteroids and comets heading toward Earth, but there are more advanced defenses involving spacecraft and nuclear Read More

China hacks used as lure for more targeted attacks
Malicious hackers have begun using the recent cyberattacks against Google and more than 30 other companies as lures for launching even more targeted attacks, security firm F-Secure said in a blog post today. Read More


WHITE PAPER: St. Bernard

6 Steps to Evaluating Web Filtering
Web filtering that doesn't compromise network performance is just one of the critical steps when considering this technology. This paper guides you through the pros and cons of a software-based solution vs. an appliance-based filter and advises on considerations ranging from implications of your acceptable use policy to properly authenticating individuals. Read More

Web users warned about hoax Amazon emails
Web users are warned about hoax emails claiming to be from etailer Amazon. Read More

Users on hacked site used 'trivial' passwords
The hackers who stole and published 33 million passwords from the Rockyou.com website in December needn't have bothered, a security company has revealed. Many of them were so trivial they could have been guessed anyway. Read More


WHITE PAPER: Microsoft

Direct Access and UAG Better Together
Direct Access (DA) is a game-changing technology for remote access in your company; removing the need for a VPN all together. Within Microsoft, we've seen great productivity benefits to end users. We surveyed users from our DA pilot and over 87% saw instant productivity gains, overall resulting in net benefit of ~1 hour each day for users. Furthermore, Microsoft operations is saving costs by things such as not having to convert internet connected sites to dedicated lines. For more information on the business value of DA and Microsoft's implementation, watch the Direct Access MSIT video. Learn More Now

Creating Secure Passwords You Can Remember
Microsoft Chairman Bill Gates declared the password dead. He told his audience that the password can't meet the challenge of keeping sensitive information protected, saying "People use the same password on different systems, they write them down and they just don't meet the challenge for anything you really want to secure." Read More

IE attacks pose small threat to U.S., big risk to China
Security researchers say that the hackers exploiting an Internet Explorer bug are far more likely to hit Chinese computers users than those in the U.S. The hackers are believed to be working from China. Read More

Google's China Challenge: How It Came to This
Google's getting some moral support from the government in its decision to stop censoring search in China. Read More

Baidu lawsuit: Register.com rep refused aid after hack
Chinese search engine Baidu.com was stranded without technical support from its U.S. domain registrar immediately after being hacked last week, Baidu has alleged in its lawsuit against the registrar. Read More



New look

We've revamped our newsletters so that they're cleaner, easier to read and lighter on the HTML formatting. What do you think? Let us know - and thanks for reading!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

New giveaways! Win a year's worth of 24/7 video training from ClipTraining. Win books on WS2008 R2, Cisco WAAS and the CCIE. Deadline Jan. 31. Plus: On Cisco Subnet: Are two routers enough to study for the CCNA? On Microsoft Subnet: AxCrypt: Open Source tool for encrypting files; On Google Subnet Google's reports blockbuster Q4, modest FY09.

SLIDESHOWS

Gotta start somewhere
What were the first products from today's biggest tech companies? Take the quiz.

2010's 25 geekiest 25th anniversaries
Our fourth annual compilation of the current year's most notable technology-related 25th anniversaries.

MOST-READ STORIES

  1. Reports: iPhone 4G rumors heat up
  2. Verizon Wireless slashes rates for unlimited voice
  3. 40/100G Ethernet transceiver market to reach half billion
  4. IE8 limits SSL VPN options for Cisco ASA users
  5. Microsoft's Ballmer: We're staying in China
  6. Facebook unleashes lawyers on Web 2.0 Suicide Machine
  7. New BlackBerrys on the horizon
  8. Google's stance on China shatters security inhibitions
  9. Csico ASA takes on botnets
  10. EFF to public: Urge the FCC to close net neutrality 'loophole'

Network World on Twitter? You bet we are

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Update your profile | Terms of Service/Privacy

Copyright Network World, Inc., 2010

Network World, Inc.,, 492 Old Connecticut Path, Framingham, MA 01701


No comments:

Post a Comment