Tuesday, July 06, 2010

Angry researchers disclose Windows zero-day bug

Honeypots for hacker detection | "Help, I am stranded!" scam haunting social networks

Network World Security

Forward this to a Friend >>>


Angry researchers disclose Windows zero-day bug
An anonymous group of security researchers last week published information about an unpatched Windows bug, saying that they were disclosing the vulnerability because of the way Microsoft treated a colleague. Read More


WHITE PAPER: Qualys Inc.

12-point checklist outlines key considerations
Discover a 12-point checklist for choosing the best vulnerability management solution for your organization. Read now!

RESOURCE COMPLIMENTS OF: AT&T

AT&T
Enterprise Embrace Rich Media Development with ECDNs Click to continue

Honeypots for hacker detection
Most corporate networks lack serious oversight, that is, no one is really watching. Watching the network and computer systems is expensive, overwhelming and fraught with false positives. No wonder then that insider attacks go undetected for months, malware proliferates stealthily and hackers can spend their time gradually infiltrating deeper and deeper, undetected. Read More

"Help, I am stranded!" scam haunting social networks
The FBI and its Internet Crime Complaint Center (IC3) today said they are seeing an uptick in the complaints about online scammers trying to steal your money posing as a good friend left stranded somewhere in need of quick cash. Read More

Suspicious Facebook app attracts nearly 300,000 fans
A suspicious application circulating on Facebook has attracted nearly 300,000 fans whose profiles could be used as launching pads for spam, according to a security analyst. Read More


DOWNLOAD: Qualys Inc.

Security & Compliance Suite Trial
QualysGuard Security & Compliance Suite Trial The 14-day Trial includes: • Unlimited network mapping and discovery • Unlimited network perimeter scans • PCI Compliance scanning • Web application security scanning • IT security policy creation, scanning and reporting Learn More!

Singapore bank suffers massive IT failure
One of Singapore's biggest banks suffered a major IT outage on Monday that took down its computer systems for seven hours. Read More

Secrecy of cloud computing providers raises IT security risks
Despite how attractive cloud computing can sound as an outsourcing option, there's widespread concern that it presents a security and legal minefield. Cloud service providers often cultivate an aura of secrecy about data centers and operations, claiming this stance improves their security even if it leaves everyone else in the dark. Read More

Interpol turns to Internet for info on most-wanted suspects
If you're on Facebook or MySpace then you're wanted by Interpol -- to help in a hunt for the international police organization's most-wanted fugitives. Read More


WHITE PAPER: Radware

New Threats Require Real-Time Protection
First generation IPS devices match patterns (or "signatures") of known attack vulnerabilities to safeguard networks. However, a significant amount of threats are dynamic and not addressable by static signature-based IPS devices. Read More Now

Future of directories in question
My dear fiend Vikas Mahajan (he's the manager for Enterprise Identity Management at AARP), a former colleague on Compuserve's NetWire, has always been available to talk over IdM issues with me since before it was IdM (we go back 20 years, it seems). He chimed in to me about the recent "Relational database: An ongoing debate" issue with some important points that I think are worth sharing with you. Edited only for clarity (and to fit the size of your screen, as the TV movies say), this is what he had to say. Read More

Academic fraud: The biology lab and the French paper
It became evident to our professor that the reason everything was neat and tidy was that Hank was not actually performing any experiments at all. He was making up all the results without the bother of doing the work. Read More

RSA weighs in on data loss prevention
According to U.S. government estimates, incidents of enterprise data loss cost businesses more than $100 billion in a single year. As threats to enterprise data grow more sophisticated, it's imperative for businesses to implement a comprehensive data security strategy. But where to start? RSA, The Security Division of EMC, provides us with these best practices for preventing enterprise data loss. Read More

Tabnapping on the increase
The use of Tabnapping, the recently-identified phishing technique, is on the rise, says Panda Labs. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

Computerworld and Network World: Best of Green IT

Computerworld and Network World: Best of Green IT Computerworld and Network World are teaming up to identify the top organizations leading the way with green-IT efforts and the coolest green-IT products. Computerworld will feature two ranked lists in its Oct. 25 issue: Top green-IT end-user organizations and a Top green-IT data center suppliers/vendors. Network World will feature the most effective green-IT products, as cited by survey respondents, in its Oct. 25 issue and online. Please fill out our short survey or forward this link to the person in your company best able to answer questions about IT energy issues. Surveys should be submitted by Thursday, July 1 at 12 noon EST.

SLIDESHOWS

Quiz: Do you know IT security?
Here is a quiz that draws questions from the vast spectrum of security options, including authentication, cryptograpy, firewalls, VPNs and more.

Your Next Laptop: Concept Designs Point the Way
Tomorrow's models may roll up, sport multiple screens or be repositionable, Transformer-style.

MOST-READ STORIES

  1. Many companies distributing open source software don't know it
  2. Cisco wants to be the standard
  3. EMC shuts down online cloud storage service
  4. Verizon LTE + iPhone = iPhone 4G?
  5. Google acknowledges YouTube hack
  6. MIT researchers promise an Internet that's 100x faster and cheaper
  7. What does Kin's fate say for Windows Phone 7?
  8. Cisco advances video agenda with Cius tablet
  9. Is Apple antenna denial?
  10. Russian spy ring needed some serious IT help

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment