Friday, January 22, 2010

What Researchers Are Learning About DDoS Tactics; Microsoft confirms 17-year-old Windows bug

Microsoft confirms 17-year-old Windows bug | Taken to the Cleaners

Network World Compliance Alert

Forward this to a Friend >>>


What Researchers Are Learning About DDoS Tactics
Two IT security specialists -- one with experience in dealing with DDoS attacks against government systems, the other a specialist from the corporate side -- share what they've learned about the targets chosen for DDoS attacks and how to adjust security strategies based on those lessons. (Second in a series) Read More


WHITE PAPER: WatchGuard

When Pressing the Send Button Results In Compliance Violations
Protecting confidential data is serious business. Failure may result in fat fines and even jail time - not to mention damage to your brand. WatchGuard's easy-to-use, all-inclusive email and web secure content and threat prevention appliances offer a complete data protection solution. Click here.

WHITE PAPER: Juniper Networks

Advancing the Economics of Networking
Aging network systems and old habits have dictated how businesses spend their IT budgets. As a result, a large percentage, if not a majority, of IT dollars are being spent to merely "stay in the race" and keep pace with the competition. Juniper Networks® proposes to change this economic model. Find out how

Microsoft confirms 17-year-old Windows bug
Microsoft warns that a bug in the kernel of a 32-bit windows versions could allow hackers to hijack PCs. The company said the bug is 17-years old. Read More

Taken to the Cleaners
A study from Credant Technologies finds clothes dropped off at the dry cleaners are often filled with forgotten USB sticks. Read More

The Great PCI Security Debate of 2010: Transcribed
For those who prefer to read as well as listen, here's a partial transcript of the PCI security debate that appeared on CSO Senior Editor Bill Brenner's Security Insights podcast and Martin McKeay's Network Security podcast. Read More

Network World's Products of the Week slideshow
Our round-up of intriguing new products from F5, Crescendo, Citrix among others. Read More


WHITE PAPER: NetApp

Inefficiencies Behind Exchange, SQL Server, More
Discover four current Microsoft application infrastructure challenges and why recent changes in Microsoft infrastructures create a compelling opportunity to improve underlying storage infrastructures right now. Learn more!

Report: ISPs Fear Many More DDoS Attacks in 2010
Internet service providers are worried about increasingly sophisticated attacks on cloud-based services, according to new survey from Arbor Networks. Read More

Mobile router hack reveals user's location
A user of Novatel Wireless's MiFi 'portable Wi-Fi' hotspot appears to have stumbled on a security flaw that could allow an outsider to work out a user's location without their knowledge. Read More

Firefox, Opera downloads soar after IE warnings
Mozilla yesterday reported a "huge increase" in downloads of Firefox in Germany after that country's computer security agency urged IE users to dump the browser and run a rival instead. Read More

Clinton: US gov't will push harder against Web censorship
The U.S. Department of State will launch several new initiatives focused on fighting Internet censorship, including working with businesses and other groups to develop mobile applications that help residents of countries with repressive governments report problems, U.S. Secretary of State Hillary Clinton said Thursday. Read More


WHITE PAPER: Riverbed

Rapid Replication for Virtual Servers
What's the connection between virtualization and acceleration? It's deeper than you might think. See how these two hot technologies complement each other to consolidate servers, enhance DR and simplify the IT infrastructure. Learn more.

Identity theft on the rise
Identity theft has been a major and growing problem in the United States for several years. The Privacy Rights Clearinghouse, a "nonprofit consumer organization with a two-part mission -- consumer information and consumer advocacy" has an excellent survey page with pointers to years of published studies and point-form summaries of many of their findings. Read More

Google hack malware said to be Chinese in origin
One researcher examining a sample of the malware used to attack Google and others for espionage purposes says it clearly is Chinese in origin, citing technical attributes of the Trojan's cyclic redundancy check algorithm. Read More

Hackers wield newest IE exploit in drive-by attacks
A security researcher said hackers are attacking some PC users by using an Internet Explorer exploit allegedly used last month to break into Google's network. Read More

Smartphones need smart security practices
As vice president of IT at Windsor Foods in Houston, Stephan Henze has to stay one step ahead of the latest IT trends. That's why he's spending a lot of time thinking about securing and deploying smartphones enterprisewide. The company had only a few-dozen smartphones just a short time ago, but IT now manages about 100 of them, and Henze foresees substantial growth in the near future. Read More

Conficker worm hasn't gone away, Akamai says
Variants of the Conficker worm were still active and spreading during the third quarter, accounting for much of attack traffic on the Internet, according to Akamai Technologies. Read More



New look

We've revamped our newsletters so that they're cleaner, easier to read and lighter on the HTML formatting. What do you think? Let us know - and thanks for reading!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

New giveaways! Win a year's worth of 24/7 video training from ClipTraining. Win books on WS2008 R2, Cisco WAAS and the CCIE. Deadline Jan. 31. Plus: On Cisco Subnet: Cisco's borderless networking: the next big thing? On Microsoft Subnet: FreeNAS: Open Source Network Attached Storage; On Google Subnet Top 10 Open Source Rookies of the Year.

SLIDESHOWS

Gotta start somewhere
What were the first products from today's biggest tech companies? Take the quiz.

2010's 25 geekiest 25th anniversaries
Our fourth annual compilation of the current year's most notable technology-related 25th anniversaries.

MOST-READ STORIES

  1. Reports: iPhone 4G rumors heat up
  2. Verizon Wireless slashes rates for unlimited voice
  3. 40/100G Ethernet transceiver market to reach half billion
  4. IE8 limits SSL VPN options for Cisco ASA users
  5. Microsoft's Ballmer: We're staying in China
  6. Facebook unleashes lawyers on Web 2.0 Suicide Machine
  7. New BlackBerrys on the horizon
  8. Google's stance on China shatters security inhibitions
  9. Csico ASA takes on botnets
  10. EFF to public: Urge the FCC to close net neutrality 'loophole'

Network World on Twitter? You bet we are

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Update your profile | Terms of Service/Privacy

Copyright Network World, Inc., 2010

Network World, Inc.,, 492 Old Connecticut Path, Framingham, MA 01701


No comments:

Post a Comment