Search This Blog

Thursday, March 11, 2010

Hackers exploit latest IE zero-day with drive-by attacks

Scareware will be most costly security scam of 2010 | Cyberattacks raise e-banking security fears

Network World Security Alert

Forward this to a Friend >>>


Hackers exploit latest IE zero-day with drive-by attacks
Hackers are exploiting the just-disclosed unpatched bug in Internet Explorer (IE) to launch drive-by attacks from malicious Web sites, security researchers said today. Read More


WEBCAST: Actuate

Discover BIRT.
Understand how BIRT simplifies and speeds to market the development of rich information applications. In this presentation, a technical expert behind BIRT will demonstrate a customer-facing application in action with Flash, Ajax, and JavaScript interactivity. Click Here!

WHITE PAPER: Sophos

Windows 7 security
With the public release of Windows 7 debates and discussions have been raging on the security improvements in the new platform, and some potential problems have also emerged. In this white paper, we run through the most significant changes and additions, and look at what they might mean to users and administrators. Read now.

Scareware will be most costly security scam of 2010
Scareware or fake antivirus programs that encourage web users to part with their hard-earned cash and download hoax security software, is likely to be the most costly scam of 2010, says McAfee. Read More

Cyberattacks raise e-banking security fears
Increasing cyberattacks against the online bank accounts of small and mid-size businesses has prompted growing calls for improved online banking security. Read More

FBI's "Ten Most Wanted" list turns 60
Call it the father of Top 10 lists.  The FBI today commemorated the 60th anniversary of its "Ten Most Wanted Fugitives" list.  Read More


E-BOOK: Sybase

5 Key Mobile Management Must-Dos
Discover the five steps you can take to realize comprehensive management of your mobile environment. This IDG Playbook will guide your strategy for managing and securing your booming mobile environment, regardless of the variety of hardware and operating systems. Read More Now

IE 6 and 7 Bug Allows for Attacks via Poisoned Sites
A new security hole in Internet Explorer 6 and 7 can be targeted via code on a poisoned Web site, Microsoft warned today. A successful attacker could install malware on a victim PC or run any other remote command. Read More

Procter & Gamble tries a bring-your-laptop-to-work program
Procter & Gamble Co. is letting several hundred of its employees use their own laptops at work as part of an experiment -- one of numerous efforts by companies trying to keep workers happy. Read More

Twitter to begin screening some links for phishing
Twitter launched a new link-screening service on Tuesday aimed at preventing phishing and other malicious attacks against users of the popular microblogging service. Read More


WHITE PAPER: IBM NWW

Develop Effective user Management
With IBM, organizations can develop comprehensive solutions to help gain visibility into business continuity risks, achieve control over utilization of sensitive business assets and automate a variety of processes for managing access to critical assets and data. Read more

Phishers widen their net to target new businesses
Cybercriminals are expanding the types of organisations they exploit in phishing attacks, says the Anti-Phishing Working Group (APWG). Read More

Zeus botnet dealt a blow as ISP Troyak knocked out
Internet service providers linked to the notorious Zeus botnet have been taken down, knocking out a third of the command-and-control servers that run the network of hacked machines. Read More

European Parliament demands transparency in ACTA talks
The European Parliament demanded Wednesday that the European Commission open up secret negotiations about an anticounterfeiting trade agreement (ACTA) to the public. Read More

Online industry unites against Digital Economy Bill
Google, Yahoo, eBay, Facebook, Orange, Talk Talk and BT have singed an open letter to the Financial Times condemning a bill in parliament that they say "threatens freedom of speech and the open internet". Read More

Reader exploit prompts Adobe update alert
Users of Adobe PDF Reader should check they are running the latest version of the software after the discovery of an exploit that takes advantage of a serious flaw patched only two weeks ago. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

The Future of Big Iron
Do your IT plans include mainframes? Participate in this Aberdeen survey and see how your plans stack up to those of peers in terms of on what core applications are staying on mainframes and where the industry is headed in operating and software architecture. The goal is to get an accurate picture of the opportunity for expanded utilization, the role of 3rd-party support, and overall objectives with respect to distributed, outsourced, heterogeneous and centralized computing paradigms. Aberdeen will also establish a baseline for performance and a set of best practices for improving the efficiency and utilization of mainframe computing technologies. All survey respondents will receive a free copy of the resulting research.

Today from the Subnet communities

Massive giveaway from Cisco Subnet: 50 copies of the Cisco Press CCNP Cert Kits kits are up for grabs. Deadline March 31. NEW! 15 books on Microsoft System Center Operations Manager (OpsMgr) 2007 R2 available, too.

SLIDESHOWS

21 apps Apple doesn't want on your 3.0 iPhone
The following 21 apps today run only on jailbroken iPhones. Some may even prove precursors to features released in future Apple iPhone firmware updates.

10 geeky items you're embarrassed to admit you want
Most of us love gadgets. But there is a certain eye-popping reaction when we find a gadget that speaks to our technological selves. Owning such devices would surely be the subject of teasing from those who deny their inner geek, but it would also be the cause of more than a little envy.

MOST-READ STORIES

  1. Time flies dept.: Dot-com craze peaked 10 years ago
  2. 10 geeky items you're embarrassed to admit you want
  3. Cisco says CRS-3 router paves way for more powerful Internet
  4. Cisco CRS-3: Is that it?
  5. Microsoft warns of new IE bug; attacks under way
  6. Are Macs really cheaper to manage than PCs?
  7. Microsoft seeks browser comeback with IE 9
  8. Tech debate: Google Gmail vs. hosted Microsoft Exchange
  9. VMware unveils experimental projects on new Web site
  10. The state of 4G in 2010

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: