Search This Blog

Friday, March 26, 2010

Conficker may be quiet now but it's still a threat

Network World Security - Newsletter - networkworld.com
iPhone, Safari, IE8, Firefox all fall on day one of Pwn2Own | US in search of Apple, cell phone forensic tools as online crime morphs

Network World Security

Forward this to a Friend >>>


Conficker may be quiet now but it's still a threat
My recent post on how botnets are operating like cloud providers provoked a lively discussion in the comments section about Conficker but mostly about world geography.I got on the phone this morning with Rodney Joffe, senior vice president and senior technologist at Neustar, whose presentation at the Cloud Connect conference last week in Silicon Valley was the basis for my post "The biggest cloud on... Read More


WHITE PAPER: Websense

Websense Security Labs State of Internet Security 2H09
Do you know just how adept Web adversaries have become in using the Internet to spread malware in their attacks? Understand where the true threats lie with this report which summarizes the significant findings of Websense researchers using the ThreatSeeker™ Network during the six-month period ending December 2009. Learn More

WHITE PAPER: Polycom

Top Five Benefits of Video Conferencing
From obvious benefits, like reduced travel costs, to a few less apparent advantages, see what Polycom customers, resellers and industry analysts are saying about the power of video conferencing. Read More

iPhone, Safari, IE8, Firefox all fall on day one of Pwn2Own
Hackers took down Apple's iPhone and Safari browser, Microsoft's Internet Explore 8 (IE8) and Mozilla's Firefox within minutes at today's Pwn2Own contest, as expected. Read More

US in search of Apple, cell phone forensic tools as online crime morphs
The always evolving world of electronic crime is forcing law enforcement agencies  to look even harder for tools and digital evidence recovery technology to keep up.  Read More

Researchers sound alarm on Web app "side channel" data leaks
New research from Microsoft and Indiana University has found that data leaks from Web applications such as popular tax programs and online health programs - even when encrypted -- is a real and growing threat. According to the research, it's inevitable that a Software-as-a-Service application's data flow will be exposed on the network to some degree when passing back and forth between a web client... Read More


WHITE PAPER: Cisco Systems Inc.

Peace Corp: Creating a worldwide unified network
Learn how the Peace Corp made its unified network a reality after selecting and deploying cost-effective WAN optimization gear. One of the key factors was selecting a platform that integrated with its existing network spanning 70 countries. The result is dramatically improved performance and significant cost savings. Learn More

Malware attack uses China World Expo guise
A malware attack dressed up as an e-mail from organizers of the upcoming Shanghai World Expo targeted at least three foreign journalists in China, in the latest sign of increasingly sophisticated cyberattacks from the country. Read More

GoDaddy to China: No More Domains for You
GoDaddy is joining Google in its fight against China's Internet control. Read More

Hacker busts IE8 on Windows 7 in 2 minutes
Dutch researcher explains his strategy for outwitting Microsoft defense mechanisms to win $10,000. Read More


E-GUIDE: HP ProCurve

Standards to Soothe Networking Headaches
Is you network comprised of multiple switching tiers running proprietary protocols capable of handling next-generation applications? This Network World eBook looks at open, virtual switching, unified fabrics and bandwidth of 10 Gigabit Ethernet and more. Get expert advice on how to turn your network into a more simplified, open infrastructure. Read Now.

Police, security officials meet on cybercrime strategies
When the "ILOVEYOU" worm crippled computer systems worldwide 10 years ago this spring, authorities in the Philippines didn't even have a law to properly charge its author. Read More

A CSO's guide to getting to "Yes"
The meeting was proceeding well. The client we were advising had assembled a team from across IT: systems, applications, network, storage… "Where is security?", we asked. "We didn't invite them – they just say no to everything and slow the meeting down. We'll pass the proposal by them later". Read More

Free app makes paid web scanners dead in the water
Google's upgraded version of its automated Web application scanner, SkipFish, has received glowing reviews from local security experts. Read More

Using social networks to establish a publicly verifiable level of trust…
It's no secret that I'm fed up with how aspects of trust and assurance are established out on the Internet. After all, I have railed against the racketeering operations public CAs operate and the ornate processes people or organizations go through to establish a level of trust/assurance with their identities. In other words, establishing trust on the Internet is broken and it really needs to... Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

The Future of Big Iron
Do your IT plans include mainframes? Participate in this Aberdeen survey and see how your plans stack up to those of peers in terms of on what core applications are staying on mainframes and where the industry is headed in operating and software architecture. The goal is to get an accurate picture of the opportunity for expanded utilization, the role of 3rd-party support, and overall objectives with respect to distributed, outsourced, heterogeneous and centralized computing paradigms. Aberdeen will also establish a baseline for performance and a set of best practices for improving the efficiency and utilization of mainframe computing technologies. All survey respondents will receive a free copy of the resulting research.

Today from the Subnet communities

Massive giveaway from Cisco Subnet: 50 copies of the Cisco Press CCNP Cert Kits kits are up for grabs. Deadline March 31. NEW! 15 books on Microsoft System Center Operations Manager (OpsMgr) 2007 R2 available, too.

SLIDESHOWS

21 apps Apple doesn't want on your 3.0 iPhone
The following 21 apps today run only on jailbroken iPhones. Some may even prove precursors to features released in future Apple iPhone firmware updates.

10 geeky items you're embarrassed to admit you want
Most of us love gadgets. But there is a certain eye-popping reaction when we find a gadget that speaks to our technological selves. Owning such devices would surely be the subject of teasing from those who deny their inner geek, but it would also be the cause of more than a little envy.

MOST-READ STORIES

  1. AT&T's new spring smartphones
  2. IPhone, Safari, IE8, Firefox all fall on day one of Pwn20wn
  3. Software tracks employee Facebook, Twitter activity
  4. Video proves there really are two sides to every story
  5. The biggest cloud on the planet is owned by ... the crooks
  6. Smartphone smackdown: HTC EVO 4G vs. Google Nexus One
  7. Five technologies in the mainstream, thanks to Apple
  8. Security companies warn of uptick in new IE attack
  9. The Nintendo 3DS -- facts, speculation and wishes
  10. Google fixes bug affecting Apps sync tool for Outlook

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: