Thursday, July 22, 2010

Microsoft 'working' on patch for critical Windows vulnerability

  Is ubiquitous encryption technology on the horizon? | Can Tethering Be Hacked?
 
  Network World Security

Forward this to a Friend >>>


Microsoft 'working' on patch for critical Windows vulnerability
Microsoft is now working on a patch to prevent exploits of a newly discovered vulnerability that affects all versions of Windows. Read More


WHITE PAPER: Riverbed

Achieve Best-in-Class App Delivery over your WAN
Supporting best-in-class application performance over the WAN is possible when you follow the recommendations in this whitepaper. Success is dependant on: *Conducting cost-benefit analysis for bandwidth upgrades *Analyzing application performance for each transaction *Evaluating test results prior to the final optimization purchasing decision Read now!

WHITE PAPER: MessageLabs

Employee Web Use and Misuse:
This white paper examines a Web security solution that gives companies the ability to monitor and enforce their Internet usage policies, bringing site monitoring and URL filtering together while insuring security with anti-virus and anti-spyware protection. Read Now

Is ubiquitous encryption technology on the horizon?
Will ubiquitous encryption of important network traffic ever happen? A group of researchers presenting at next month's Usenix Security Symposium will talk about a technology they say could make end-to-end encryption of TCP traffic the default, not the exception. Read More

Can Tethering Be Hacked?
First of all, please be advised that I do not advocate, in this case or any other, doing anything illegal or in any way violating the terms of a cellular service contract, or any other agreement, under any circumstances apart from life-or-death emergencies. Ethical people keep their word and meet their obligations, period. Read More

Operation Death Match reaps another identity thief
Federal authorities don't take kindly to people stealing the identities of dead folks. A British citizen whose real name is John Skelton this week became one of the 150 people that have been arrested and charged with federal passport fraud and related offenses under a program known as Operation Death Match. Read More

After worm, Siemens says don't change passwords
Although a newly discovered worm could allow criminals to break into Siemens' industrial automation systems using a default password, Siemens is telling customers to leave their passwords alone. Read More


WHITE PAPER: Qualys

12-point checklist outlines key considerations
Discover a 12-point checklist for choosing the best vulnerability management solution for your organization. Read now!

It pays to know your MAC address
Who goes around memorizing their MAC address? Students, apparently. And it's not a bad idea. Read More

Playboy's new site is safe for work? … Aw, Hef's such a kidder
Ever since Playboy announced that it intended to launch a new Web site called The Smoking Jacket that we were promised would be safe for everyone to read at work, I've been anxious to see whether the legendary Hugh Hefner could -- or would -- actually produce such a thing. The site launched officially today, soooo .... Is it really safe for work? Read More

Adobe to beef up PDF security with Reader sandboxing
Adobe today announced that it will harden the next version of its popular Reader PDF viewer, a frequent target of attacks, by adding "sandboxing" technology to the software. Read More

Windows Shortcut Exploit: What You Need to Know
Microsoft released Security Advisory 2286198 late last week to address a newly-discovered zero-day flaw that can be exploited simply by clicking a shortcut icon. However, that original guidance is being questioned by security researchers, and exploit code is now available, making a bad situation even worse. Read More


WHITE PAPER: MessageLabs

The Wild, Wild Web: How to Ensure 360-Degree Border Security
Managing the security and availability of Web, email, and IM is complex. This paper will discuss the modern threat of blended attacks from web, email and IM. and highlight how a comprehensive hosted solution by Symantec Hosted Services can secure your networks from these threat vectors. Read Now

IBM device secures online banking
IBM this week rolled out a security device it says will protect online banking and keep cyber-criminals from being able to make fraudulent funds transfer even from a compromised PC. Read More

Network stress test tools: Dos and don'ts
Network stress testing tools are not for the underfunded, the underskilled or the faint of heart. Consider them carefully before deciding whether to purchase them or how to use them. Read More

Network security for the masses
Information security is an exalted field. Exalted both in the sense of "noble" and in the sense of "inflated". We practice security as a dark art, a complex discipline of insiders with obscure acronyms. Even more than other areas of IT, security professionals are a "special" breed, as one can clearly see by the many certifications following our names, almost like titles of nobility. Yes, security is complex and esoteric. No, it should not be the practice of the few, but the practice of the many. Read More

Apple squashes bugs with iTunes 9.2.1 update
To kick off the start of the new work week, Apple has released a minor update to iTunes 9.2 to fix some bugs and keep iTunes trucking. Read More

 
 
 

Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

SLIDESHOWS

Say what?
Earlier this month, Microsoft's chief operating officer made a statement that sent everyone's jaws a-dropping. "It looks like the iPhone 4 might be their Vista, and I'm OK with that," he said during a keynote speech at the company's annual partner conference. It got me thinking about quotes that have and will go down in history from the industry's most famous executives. Can you guess who made the following statements?

15 summer vacation ideas for geeks
From Star Trek and Space Camp to baseball minutiae, vintage video games, anime, pirates, Harry Potter and They Might Be Giants, there's a vacation option for any type of geek this summer.

MOST-READ STORIES

  1. Is open source Snort dead? Depends who you ask
  2. Is Windows Phone 7 really a "disaster"?
  3. Is ubiquitous encryption technology on the horizon?
  4. Apple: iPhone 4 bumper giveaway may cost $175 million
  5. White iPhone 4 'not up to Apple's standards'
  6. Windows Phone 7 'preview' winning generally good reviews
  7. 20 Tech Habits to Improve Your Life
  8. Mobile deathmatch: Apple iOS 4 vs. Android 2.2
  9. Firefox lets hackers grab your passwords
  10. New rootkit threatens all versions of Windows

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment