Tuesday, June 15, 2010

Linux Trojan Raises Malware Concerns

  AT&T 'dishonest' about iPad attack threat, say hackers | Google, Microsoft online apps both fail over privacy ...
 
  Network World Security

Forward this to a Friend >>>


Linux Trojan Raises Malware Concerns
I've got good news and bad news for those of the misguided perception that Linux is somehow impervious to attack or compromise. The bad news is that it turns out a vast collection of Linux systems may, in fact, be pwned. The good news, at least for IT administrators and organizations that rely on Linux as a server or desktop operating system, is that the Trojan is in a game download so it should have no bearing on Linux in a business setting. Read More


RESOURCE COMPLIMENTS OF: ArcSight

Gaining a "House Advantage" Over Modern Threats
Today's businesses are highly interdependent & need the advantage to beat the odds against a coordinated cyber attack. Join this webinar of cybersecurity experts as they discuss some of the architectural issues that enable modern security threats as well as techniques for shutting them down & new solutions for detecting & stopping cybercrimes. Click to continue

RESOURCE COMPLIMENTS OF: AT&T

AT&T
Designing Tomorrow's Ethernet-Based Metropolitan Area Networks Click to continue

AT&T 'dishonest' about iPad attack threat, say hackers
The hackers who harvested more than 100,000 Apple iPad 3G owner e-mail addresses blasted AT&T as "dishonest" today, and said the group has an exploit it or others could have used against all iPad owners. Read More

Google, Microsoft online apps both fail over privacy ...
Microsoft and Google are no longer pretending to play nice. They have attacked each other with virtual blood spilled on each side. While these two giants are busy battling for dominance, will you suffer as your right to privacy falls by the wayside? Read More

Microsoft says Google security researcher put Windows customers at risk
Microsoft accused a Google security researcher of putting Windows customers at risk of "broad attacks" by publishing code that exploits a zero-day vulnerability.As reported by Gregg Keizer of Computerworld, Google security engineer Tavis Ormandy "posted details of the vulnerability and proof-of-concept attack code," in a move that was controversial because he had only notified Microsoft a few days... Read More


WHITE PAPER: Riverbed

Strategies for Unleashing Cloud Performance
Whether a business builds out its own cloud or buys cloud services from someone else, they need to be sure the end results are optimized for the speed users require. This paper identifies where the limitations of cloud computing exist and provides actionable strategies to unleash cloud performance. Click here!

Adobe Fixes Flash Zero-Day with Massive Security Update
Adobe has been in the headlines for all the wrong reasons recently with new attacks exploiting flaws in Adobe Flash and Adobe Reader. Adobe has addressed the security vulnerabilities now with an immense update resolving a variety of serious issues. Read More

15 reasons why Mars is one hot, hot, hot planet
No matter how you look at it Mars is one hot planet these days. President Obama talked about going there, NASA continues to pump almost weekly new discovery information from the red planet, lots of money is being spent to develop exploration instruments and now there is a group of "astronauts" in Europe locked into a faux spaceship, pretending to fly there. Read More

iPad e-mail hackers defend attack as 'ethical'
The hackers who harvested an estimated 114,000 Apple iPad 3G owner e-mail addresses defended their actions Friday as "ethical" and said they did nothing illegal. Read More


WHITE PAPER: ArcSight

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center

What's in a smartphone processor? Increasingly a lot
Over the past few years, many processor chips have moved far beyond the traditional functions of plain old central processing units (CPUs) and are now responsible for a wide array of functions including power saving, system memory and video processing. Read More

Apps must disconnect to survive
If your mobile application can't work inside a lift, or crashes though train tunnels then you need to back to the drawing board, says one Windows Phone 7 developer. Read More

Using e-mail safely and well
In recent columns, I've been posting notes for public discussions on topics of Internet safety and appropriate behavior held at the Brown Public Library in Northfield, Vt. Today's column is the one-pager I distributed at the second of the discussions, which dealt with a few key points about using e-mail effectively and safely. Many of the points were drawn from articles originally published in this column over several years and collected in "Using E-mail Safely and Well" which is freely available for distribution (but not for re-posting on public Web sites). Read More

 
 
 

Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Computerworld and Network World: Best of Green IT

Computerworld and Network World: Best of Green IT Computerworld and Network World are teaming up to identify the top organizations leading the way with green-IT efforts and the coolest green-IT products. Computerworld will feature two ranked lists in its Oct. 25 issue: Top green-IT end-user organizations and a Top green-IT data center suppliers/vendors. Network World will feature the most effective green-IT products, as cited by survey respondents, in its Oct. 25 issue and online. Please fill out our short survey or forward this link to the person in your company best able to answer questions about IT energy issues. Surveys should be submitted by Thursday, July 1 at 12 noon EST.

SLIDESHOWS

10 useful Firefox-based apps
Here are 10 useful desktop programs that run on the open-source Web browser's native technology. All of these applications are free for you to download and use -- and only one is a Web browser.

5 things we love/hate about cloud automation tools
Here are some things we love and some things we hate about cloud automation tools.

MOST-READ STORIES

  1. Amazon cloud uses FedEx instead of Internet to ship data
  2. Microsoft's sleep proxy lowers PC energy use
  3. Enterasys looks to head off Cisco, Brocade data center plans
  4. Apple would rather remove app than leave open-source license
  5. Online porn users take huge risks, study finds
  6. Confused by 10GbE optics modules?
  7. Cisco Quad set to ship before November
  8. SeaMicro's cloud server sports 512 Atom processors
  9. 30% of Brits will watch World Cup online
  10. Microsoft confirms critical Windows XP bug
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment