Friday, June 11, 2010

Microsoft confirms critical Windows XP bug

FTC bombs massive robocall operation | Top 6 IT skills employers are looking for

Network World Security

Forward this to a Friend >>>


Microsoft confirms critical Windows XP bug
Microsoft has confirmed that Windows XP and Windows Server 2003 contain an unpatched bug that could be used to infect PCs by duping users into visiting rigged Web sites or opening attack e-mail. Read More


WHITE PAPER: Adobe

Close the Web 2.0 Communications Gap
Web 2.0 tools have yet to reach critical mass and broad user adoption. This Forrester report identifies the key Web 2.0 gaps and offers advice to: Build a framework that extends email, Upgrade document-based data collection, and Improve email and document exchange security. Read More

WHITE PAPER: Novell

Intelligent Storage Management at the File Level
Many storage management tools for file storage are "dumb." They treat all files the same regardless of business relevance and they lack the ability to automate user-storage management tasks or set policies based on business requirements. Learn how to augment your existing storage management system with intelligence at the file level. Read Now

FTC bombs massive robocall operation
The Federal Trade Commission today had a federal court in Chicago halt a major telemarketing operation that made at least 370 million calls illegal phone calls pitching worthless extended auto warranties and credit card interest rate-reduction programs.   Read More

Top 6 IT skills employers are looking for
Last month Dark Reading posted an article by Kelly Higgins on Six Hot and Sought-After IT Security Skills. Based on interviews with hiring managers from recruitment firms, the IT security job market is booming and here are the top six skills employers are looking for: 1. Incident-handling/response 2. Compliance know-how 3. Risk management 4. Business acumen 5. Government security clearance 6.... Read More

HP takes on Microsoft on application security
Microsoft drew a crowd at the RSA Conference 2010 in San Francisco in March to a breakout session on its Security Development Lifecycle (SDL) initiative to build software applications from day one with security in mind. Meanwhile, HP's John Diamant was speaking at the same conference about what he thinks might be an even better approach. Read More

Using Network Access Protection Outside of Windows
I recently blogged about access control differences between Windows and Linux/UNIX, and a reader wondered about whether NAP was supported outside of Windows. Well, that's a good question. Read More


WHITE PAPER: ShoreTel

Conquer the Cost of IP Complexity
Companies are frequently tied to expensive, complex, legacy telecommunications systems that don't support modern technologies and applications, such as unified communications. This white paper examines the challenges associated with legacy systems and how to achieve greater value and opportunities with IP-based technology. Read More

BP oil spill disaster data available online from US Dept. of Energy
The US Department of Energy this week opened an online portal where the public can get all the technical details it can stomach about the BP oil disaster in the Gulf.  The DOE site offers online access to schematics, pressure tests, diagnostic results and other data about the malfunctioning blowout preventer and oth Read More

'Brute force' script snatched iPad e-mail addresses
Security experts blamed a 'brute force' attack that exposed the e-mail addresses of more than 100,000 iPad owners on poorly-designed AT&T software. Read More

Should You Worry about the iPad 3G Data Leak?
Oops. AT&T has egg on its face after leaving sensitive information on 114,000 owners of the iPad 3G exposed on the Web. A group known as Goatse Security has published the personal e-mail addresses of the victims--many of whom are popular celebrities, prominent executives and high-ranking dignitaries--that it obtained by exploiting an automated script on an AT&T server. Read More

Federal security framework targets unnecessary governance
The Federal Government has formally launched its Protective Security Policy Framework in order to simplify the government security processes as part of a wider movement to improve Australia's national security. Read More


E-GUIDE: Compuware

Perfecting Application Performance
The enterprise application scene has become increasingly complicated over the years. Things have changed with the rise of Web services, SOA, Virtualization and cloud computing. In this Executive Guide explore how to get the best performance out of today's application environments. Read Now.

ISPs reluctant to filter outbound spam
With spam volumes rising relentlessly a new survey claims to have detected an iota of worry among service providers. It seems many of them would love to do something about it but don't know what. Read More

Privacy group to go to police over Google Wi-Fi data collection
Privacy International has revealed it will approach the Police regarding Google's recent admission it had mistakenly collected data from unsecured Wi-Fi networks for the past three years. Read More

Identity management top security priority in Gartner survey
"The No.1 priority is now identity and access management," says Gartner research director Vic Wheatman, noting the analysis is based on a close look at what IT security professionals at 308 companies are telling Gartner about their overall information spending and specific IT security projects. Read More

Safari 5 packs dozens of security patches
The newly-released Safari 5 comes with a healthy performance boost plus a few great additions, such as Reader and Extensions, that have sparked some discussion throughout the Web. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Computerworld and Network World: Best of Green IT

Computerworld and Network World: Best of Green IT Computerworld and Network World are teaming up to identify the top organizations leading the way with green-IT efforts and the coolest green-IT products. Computerworld will feature two ranked lists in its Oct. 25 issue: Top green-IT end-user organizations and a Top green-IT data center suppliers/vendors. Network World will feature the most effective green-IT products, as cited by survey respondents, in its Oct. 25 issue and online. Please fill out our short survey or forward this link to the person in your company best able to answer questions about IT energy issues. Surveys should be submitted by Thursday, July 1 at 12 noon EST.

SLIDESHOWS

10 useful Firefox-based apps
Here are 10 useful desktop programs that run on the open-source Web browser's native technology. All of these applications are free for you to download and use -- and only one is a Web browser.

5 things we love/hate about cloud automation tools
Here are some things we love and some things we hate about cloud automation tools.

MOST-READ STORIES

  1. Good sign for economy: More people are quitting jobs
  2. Networking's 20 greatest arguments
  3. AT&T bug discloses iPad owners' e-mail addresses
  4. Firefox vs. Chrome vs. Internet Explorer
  5. AT&T's new data plan means companies will ditch 3G cards
  6. Google slams Apple over iPhone ad ban
  7. Apple's iPhone 4: Four worthy alternatives
  8. 'Pearl Harbor' post struck a nerve
  9. Brocade unveils unified data center strategy
  10. IT security skills in short supply

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment