Monday, June 14, 2010

After attacks, Adobe fixes Flash bug

  iPad 3G Leak Flaw More Common than You Think | US Coast Guard calls for high-tech help in BP oil disaster
 
  Network World Security

Forward this to a Friend >>>


After attacks, Adobe fixes Flash bug
Less than a week after fielding reports that hackers were targeting a bug in its Flash Player software, Adobe Systems has rushed out a fix for the problem. Read More


WHITE PAPER: ArcSight

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center

RESOURCE COMPLIMENTS OF: AT&T

AT&T
Designing Tomorrow's Ethernet-Based Metropolitan Area Networks Click to continue

iPad 3G Leak Flaw More Common than You Think
AT&T is taking some well-deserved heat for a Web security flaw resulting in the exposure of more than 114,000 iPad 3G owners' e-mail addresses. Apple--by proxy--has also drawn some criticism as it apparently has some culpability in defining the authentication mechanism that was exploited. It is obviously a huge embarrassment for both AT&T and Apple, but the underlying issues, and other Web security issues like it, are actually quite common. Read More

US Coast Guard calls for high-tech help in BP oil disaster
The US Coast Guard has issued a call for better specialized technology to help it better respond to the ever-widening BP Deepwater oil spill disaster in the Gulf of Mexico. Read More

IBM, HP bump up corporate security services
Getting a handle on application security vulnerabilities is the idea behind services and products from HP and IBM announced this week. Read More

Online porn users take huge risks, study finds
Online porn is one of the most hostile environments on the Internet but malware distribution itself appears to be only a profitable sideline for the adult industry, a new study has suggested. Read More


WHITE PAPER: Riverbed

Overcome Two Key Challenges with Virtualization
How do you accelerate virtualization for your enterprise - and take IT flexibility and cost savings to the next level? Start by downloading this whitepaper from Riverbed. WAN optimization is a class of technology that has rapidly been adopted across enterprises in order to address the challenges of bandwidth limitations and latency over the WAN. Click here!

How to delete fake antivirus
QUESTION Our son's laptop has started throwing up virus alerts for Antivirus 7.0. We've searched online for a solution, but can't differentiate between genuine advice and yet more scareware. Andrew & Eileen Wood Read More

Trend Micro acquires U.K. cloud storage vendor humyo
Trend Micro has acquired humyo, an online storage and data synchronization company, to enhance its cloud security offerings. Read More

US lawmakers disturbed over Google's Wi-Fi snooping
Three U.S. congressmen who asked Google to explain why and how it collected data being transmitted over Wi-Fi networks from its Street View cameras were not placated by the search giant's response. Read More

Grandkids to welcome 'uberveillance'
You may reject the idea of a microchip implant, but your grandchildren could embrace them, according to an Australian professor. Read More


E-GUIDE: Compuware

Perfecting Application Performance
The enterprise application scene has become increasingly complicated over the years. Things have changed with the rise of Web services, SOA, Virtualization and cloud computing. In this Executive Guide explore how to get the best performance out of today's application environments. Read Now.

Protect Windows XP from Zero-Day Flaw in HCP Protocol
Earlier this week was Microsoft's Patch Tuesday for June--a busy Patch Tuesday with ten new security bulletins fixing 34 different vulnerabilities. However, there is now a publicly disclosed vulnerability with potentially dire consequences that didn't make the list of patches this month. IT administrators need to understand the risks, and act now to mitigate the threat and protect Windows XP systems from the HCP protocol vulnerability. Read More

Socializing safely via the Internet
In my last column, I exhorted readers to contribute to integrating cyberspace into our young people's moral universe by getting out into their communities and speaking about Internet safety and other matters of interest. Read More

Microsoft leaves some Office XP users patchless
For the second time in nine months, Microsoft has declined to patch a vulnerability in an older product because creating a fix was "infeasible." Read More

Remains of the Day: Sculley looks back, Portal pushed back
A prodigal son returns to Apple, former Apple CEO John Sculley reflects on being the guy who fired the world's most successful businessman, and AT&T slips up on security. That and more in the remainders for June 9, 2010. Read More

Neither Google nor Googler can wash hands of Windows bug disclosure
Google security engineer Tavis Ormandy is either naïve or disingenuous when he protests that his controversial disclosure of an unpatched Microsoft bug reflects solely on him and not at all on his employer. Google is simply attempting damage control when it makes the same claim. The real world doesn't work that way. Read More

 
 
 

Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Computerworld and Network World: Best of Green IT

Computerworld and Network World: Best of Green IT Computerworld and Network World are teaming up to identify the top organizations leading the way with green-IT efforts and the coolest green-IT products. Computerworld will feature two ranked lists in its Oct. 25 issue: Top green-IT end-user organizations and a Top green-IT data center suppliers/vendors. Network World will feature the most effective green-IT products, as cited by survey respondents, in its Oct. 25 issue and online. Please fill out our short survey or forward this link to the person in your company best able to answer questions about IT energy issues. Surveys should be submitted by Thursday, July 1 at 12 noon EST.

SLIDESHOWS

10 useful Firefox-based apps
Here are 10 useful desktop programs that run on the open-source Web browser's native technology. All of these applications are free for you to download and use -- and only one is a Web browser.

5 things we love/hate about cloud automation tools
Here are some things we love and some things we hate about cloud automation tools.

MOST-READ STORIES

  1. Google researcher put customers at risk
  2. 30% of Brits will watch World Cup online
  3. Amazon cloud uses FedEx instead of Internet to ship data
  4. Networking's 20 greatest arguments
  5. 6 strange ways to make money online
  6. FTC bombs massive robocall operation
  7. Google can't wash hands of Windows bug disclosure
  8. 8 trends driving IT job growth, salaries
  9. Microsoft confirms critical Windows XP bug
  10. Steve Jobs' WWDC Wi-Fi meltdown - a little perspective
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment