Search This Blog

Friday, May 07, 2010

Feds shred counterfeit Cisco trade

Microsoft goes small for next week's Patch Tuesday | The DDoS attack survival guide

Network World Security

Forward this to a Friend >>>


Feds shred counterfeit Cisco trade
With a new conviction today, the federal action known as Operation Network Raider has resulted in 30 felony convictions and more than 700 seizures of counterfeit Cisco network hardware with an estimated value of more than $143 million.  Read More


WHITE PAPER: Oracle

Business Agility Strategies For Midsize Organizations
Midsize businesses have enormous IT pressures: building an infrastructure that is flexible, designed to accommodate rapid growth and meets compliance challenges with resources nowhere near larger enterprises. This video whitepaper explains how Oracle is delivering applications specifically for midsize businesses. Learn More

WHITE PAPER: Brocade

Deployment Strategies for 802.11n
Many organizations are looking to reap the benefits of the new 802.11n standard, but what is the best way to deploy wireless technology while minimizing costs? Learn why understanding the "Three Cs"-context, coverage, and capacity-is critical for choosing an optimal network implementation strategy. Read More!

Microsoft goes small for next week's Patch Tuesday
Microsoft today said it would patch two critical vulnerabilities with two updates to Windows and Office next week. Read More

The DDoS attack survival guide
How botnets and application vulnerabilities have made DDoS attacks more damaging than ever before, and what you can do to fight back. Read More

Michael Dell calls for cybersecurity rethink
Cybersecurity needs a global rethink, and fast, Dell's CEO Michael Dell and Services CTO, Jim Stikeleather, have warned experts at the EastWest Institute Worldwide Cybersecurity Summit in the US. Read More


WHITE PAPER: Adobe

Close the Web 2.0 Communications Gap
Web 2.0 tools have yet to reach critical mass and broad user adoption. This Forrester report identifies the key Web 2.0 gaps and offers advice to: Build a framework that extends email, Upgrade document-based data collection, and Improve email and document exchange security. Read More

China state news agency Web site hit with malware
A section of the Web site for China's state-run Xinhua news agency was found to be distributing malware last month, according to a Google malware scanning service that is still labeling the site as potentially harmful. Read More

Security firm reveals Microsoft's 'silent' patches
Microsoft silently patched three vulnerabilities last month, two of them affecting enterprise mission-critical Exchange mail servers, without noting the bugs publicly, a security expert said today. Read More

New Facebook Social Features Secretly Add Apps to Profile
When a piece of software is automatically installed on your computer without your knowledge, it's called malware. But what do you call it when Facebook apps are added to your profile without your knowledge? We discovered Wednesday that this is actually happening, and stopping it isn't as easy as checking a box in your privacy settings. Read More


WHITE PAPER: Riverbed

Overcome Two Key Challenges with Virtualization
How do you accelerate virtualization for your enterprise - and take IT flexibility and cost savings to the next level? Start by downloading this whitepaper from Riverbed. WAN optimization is a class of technology that has rapidly been adopted across enterprises in order to address the challenges of bandwidth limitations and latency over the WAN. Click here!

Hacker develops multi-platform rootkit for ATMs
One year after his Black Hat talk on Automated Teller Machine security vulnerabilities was yanked by his employer, security researcher Barnaby Jack plans to deliver the talk and disclose a new ATM rootkit at the computer security conference. Read More

IPv6 tunnel basics
More Internet traffic is expected to be carried via tunnels as the Internet infrastructure migrates from IPv4, the current version of the Internet protocol, to the long-anticipated upgrade known as IPv6. Read More

Users are Their Own Worst Enemy for Online Privacy
As much heat as Facebook has taken recently for its privacy policies and the freedom with which it shares data across the Web and around the world, Facebook is still not the biggest threat to online privacy--you are. A study by Consumer Reports illustrates that users are really their own worst enemy when it comes to online privacy. Read More

Real security breaches take time
In the movies, security breaches are binary affairs. One second the attacker is faced with insurmountable NSA grade encryption, the next they have complete control of everything. Of course, in real life, security breaches are much more boring. A real-life security breach, whether by an external attacker or a disgruntled insider unfolds gradually, over weeks, months or even years. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

15 copies of CCNP ROUTE study kits available and 15 copies of Unix and Linux System Administration Handbook up for grabs, too.Deadline May 31.

SLIDESHOWS

Geeky Weddings, Birthdays, and Funerals
If you've ever dreamed of marrying a video-game character, having your ashes put in a computer, or holding your wedding on the deck of Star Trek's USS Enterprise, you're not alone.

2010 'Geek and Tech' Summer Movie Preview
It's summer movie time again, time for the movie studios to trot out its blockbusters with explosions and all sorts of fun. Here's our picks for the favorite movies that techies and geeks (comic book fans, unite!) will be lining up for.

MOST-READ STORIES

  1. Wi-Fi key-cracking kits sold in China mean free Internet
  2. Is the Android truly open source?
  3. Hacker develops multi-platform rootkit for ATMs
  4. 10 hot energy projects that could electrify the world
  5. Oral Roberts banishes Cisco
  6. FCC to claim some broadband regulatory power
  7. Microsoft woos developers with latest IE9 preview
  8. Ellen: "The people at Apple didn't think it was so funny"
  9. Indie developers create 'choose your own price' game bundle
  10. IE9 sure is faster, but users have mixed reactions

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: