Search This Blog

Monday, May 03, 2010

Microsoft issues workaround, advice for SharePoint zero-day

Diary of a mad McAfee antivirus victim | Tips for using Twitter, Facebook and other "anti-social networks"

Network World Security

Forward this to a Friend >>>


Microsoft issues workaround, advice for SharePoint zero-day
Microsoft urged SharePoint 2007 administrators to protect systems against a recently revealed zero-day vulnerability that could be exploited to steal company secrets. Read More


WHITE PAPER: Adobe

Close the Web 2.0 Communications Gap
Web 2.0 tools have yet to reach critical mass and broad user adoption. This Forrester report identifies the key Web 2.0 gaps and offers advice to: Build a framework that extends email, Upgrade document-based data collection, and Improve email and document exchange security. Read More

WHITE PAPER: Splunk

Make IT Data a Strategic Asset
This paper outlines the struggles organizations face managing silos of IT data and how, using Splunk, users are changing the way they do their jobs and elevating the role of IT in their organizations. Learn More!

Diary of a mad McAfee antivirus victim
As if McAfee's bad antivirus update last week wasn't bad enough, some customers were none too happy with how the security vendor's tech support handled the situation either. Read More

Tips for using Twitter, Facebook and other "anti-social networks"
Corporations should institute daily one-minute Internet safety lessons that users must complete before they are allowed online, a security expert told Interop attendees this week, but he said even that might not work because attackers pay more attention to the advice than those it is intended to protect. Read More

US Navy pays $94 million to bolster space technology
The US Navy wants to jump start its space technology and this week awarded a $94.7 million contract to Orbital Sciences to do just that.               Read More

Computer contractor gets five years for $2M credit union theft
For the second time this week, companies are getting a stark reminder of the danger posed to enterprise networks and assets by insiders with privileged access. Read More


WHITE PAPER: Sophos

Best practices for implementing Windows 7
If you're planning to roll out Windows 7, now is the time to review your endpoint and data protection strategies to make sure that you're taking full advantage of the new security features as well as enhancing your overall security for enterprise deployments. Read Now.

US Air Force phishing test transforms into a problem
Sorry Airman Supershaggy, "Transformers 3" is not coming to Andersen Air Force Base. And by the way, you've been phished. Read More

Researcher: Social networks shouldn't reuse private info
A Microsoft researcher argues that user data should not be reused by social networks Read More

Glype 'anonymous' proxy may not cloak your identity
A widely used proxy service thought to provide anonymous Web surfing and used to skirt network administrator bans on access to sites like Facebook frequently reveals sensitive information about its users, according to a Swiss security researcher. Read More

Five top tactics in retail theft today
While the lousy economy of the past two years certainly hit retailers hard in the form of slow business, many stores had another problem to contend with as well: Increased theft. 2009 created "the perfect storm in retail shrink," according to Derek Rodner, vice president of product strategy at Agilence, a maker of retail loss prevention products. Read More


REPORT: Network World

The job market for CIOs is rebounding
Are you ready to make the jump? This special report from Network World and the CIO Executive Council contains solid advice that will give you an edge, as well as personal accounts from CIOs who share the challenges and successes that have defined their own careers. Take your first step down the path today!

How to Avoid PlayStation Game Download Scams
A concerned parent emailed recently asking for advice about websites that promised "unlimited PSP downloads." Did they really offer "unlimited" downloads? Were they legit? He'd just bought his son a PSP Go, and since the Go lacks a physical disc drive, was presumably looking for alternatives to Sony's online software store. Read More

Google patches Chrome for second time this month
Google patched three vulnerabilities in the Windows version of Chrome earlier in the week, marking the second time that it's plugged security holes this month. Read More

Report: Palin e-mail snooping jury deadlocked
The federal jury deliberating the fate of the man who allegedly accessed former Alaska Gov. Sarah Palin's e-mail account in 2008 is deadlocked on one of the four charges, according to a Knoxville newspaper. Read More

New Threat: Undetectable Facebook Scams
I recently received two Facebook e-mail notifications that set my security spider-sense tingling. Nothing was obviously wrong with the e-mail messages, which said that my friend had tagged a photo of me and then commented on it. But something about a reference to an app named "Who stalks into your profile" just didn't feel right. Read More

Encryption high-priority for Massachusetts
The Massachusetts data-privacy law that kicked in this March requires, among other things, the encryption of personally identifiable information when sent over the Internet. Government agencies have also been given their own guidelines by the state's governor, which has prompted new encryption technology deployments. Read More

Security pros, meet your new best friend: the CFO
Executives in charge of information security should make friends with the CFO, who can give them a broad overview of corporate priorities and see to funding the most important IT projects that protect corporate data. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

15 copies of CCNP ROUTE study kits available and 15 copies of Unix and Linux System Administration Handbook up for grabs, too.Deadline May 31.

SLIDESHOWS

Confessions of tech hoarders
How much hardware do you have hidden in your home's nooks and crannies? One tech hoarder shares pictures of his stash, as well as those of some readers.

Interop history quiz
The venerable networking tradeshow Interop convenes this month in Las Vegas. Answer the following 10 questions about Interop, keep score and see how you stack up at the end.

MOST-READ STORIES

  1. Microsoft kills Courier tablet project
  2. U.S. Air Force phishing test transforms into a problem
  3. Terry Childs juror explains why he voted to convict
  4. Apple comes down hard on iPhone leakers
  5. Jon Stewart assails Apple for becoming "big brother"
  6. Apple iTunes 9.1.1 software update released
  7. Eight signs you are an Apple addict
  8. 7 Android devices that aren't phones
  9. Interop: Avaya breathes new life into Nortel enterprise
  10. Texas man to plead guilty to building botnet-for-hire

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: