Friday, July 16, 2010

Windows XP SP2 and 7 other things Microsoft has killed this year

Cisco Linksys among "millions" of hackable routers | The top 10 'most wanted' spam-spewing botnets

Network World Compliance

Forward this to a Friend >>>


Windows XP SP2 and 7 other things Microsoft has killed this year
Microsoft's official curtailing this week of support and patches for Windows 2000 and Windows XP Service Pack 2 marks the latest in a string of moves by the company to kill off products and technologies that either outlived their usefulness or never became useful in the first place. Read More


WHITE PAPER: ArcSight

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center

In this Issue


WEBCAST: Meraki

Take Your WiFi to the Cloud
Learn how to bring simplicity, security and scalability to your wireless network by leveraging the cloud. This Webcast demonstrates how cloud-controlled WiFi delivers: • Security • Reliability • Performance View now!

Cisco Linksys among "millions" of hackable routers
Ever want to hack into millions of routers? Or try to stop someone from doing so?Perhaps a discussion at the upcoming Black Hat conference in Las Vegas will help you in either or both goals. And its title, "How to Hack Millions of Routers," cuts right to the chase too. Read More

The top 10 'most wanted' spam-spewing botnets
Spam continues to grow largely due to the growth in malicious botnets. Many botnets are command-and-control systems used by criminals and are still the main way that spam is spewed into your e-mail box. M86 Security says that the worldwide spam volume has now climbed to 230 billion messages per day, up from 200 billion at the start of 2010. Read More

Top 10 social networking threats
Social network tools have changed the way we interact in our personal lives and are in the process of transforming our professional lives. Increasingly, they play a significant role in how business gets done. But they're also high risk. With hundreds of millions of users, these tools have attracted attackers more than any other target in recent years. Read More

ZeuS Trojan attempts to exploit MasterCard, Visa security programs
The notorious ZeuS banking Trojan is showing off a new trick: Popping up on infected computers with a fake enrollment screen for the "Verified By Visa" or "MasterCard SecureCode Security" programs. Read More

Cisco tops in IPS: survey
Cisco is the "top dog" in a recent customer survey of the leading Intrusion Prevention System vendors conducted by Infonetics Research. The June survey queried IPS buyers at 105 US and Canadian companies with at least 100 employees. Read More

Maiffret returns to eEye Digital Security
Marc Maiffret has left FireEye and is back at the company he helped launch, three years after breaking away. Read More


WEBCAST: Nimsoft

Reasons to Consider Cloud IT Monitoring
Join this Webcast to learn the value of IT monitoring delivered via the cloud. You can monitor and manage all business applications, from the data center to the cloud, including SaaS, hosted, and virtualized environments—all with a single product, architecture, and console. There's even a 30-day free trial download. View Now

why executives are the easiest social engineering targets
Security managers are often concerned about employees who use Facebook at work and fall for the 419 "I'm trapped in London and need money" scam. Others might still have some in their organization who are convinced it is the Prince of Nigeria who wants to share his fortune. And with spear phishing, a targeted email attack in which messages are created to look like they come from an employer, bank or other trusted source, now a common criminal technique, the need for effective awareness programs for employees has become paramount. But those concerns, according to Jayson Street, a security consultant and CIO of Stratagem 1 Solutions, shouldn't be the chief worry. That's because the biggest social engineering threat is the top executives in a company -- and they're the ones who need to be educated the most. Read More

Finjan sues McAfee, Symantec over patent claims
Finjan has sued five rival security companies, including Symantec and McAfee, claiming it holds crucial patents used by popular antivirus products and security services. Read More

White House meeting aimed to assert cybersecurity leadership
The White House meeting on cybersecurity issues held on Wednesday appears to have been as much about assessing progress on the Presidents cybersecurity agenda as it was on showing executive office leadership on the issue. Read More

Talk on China Cyber Army pulled after pressure
A talk on China's military cyber-attack capabilities has been pulled from the Black Hat security conference schedule following pressure from Taiwanese and Chinese agencies. Read More

Will security worries propel DNS into the cloud?
Security on the Internet's Domain Name System will be tightened today, with the addition of digital signatures and public-key encryption to the root zone. But will the deployment of DNS Security Extensions (DNSSEC) prompt more enterprises to outsource their DNS operations? Read More

Trojan attacks credit cards of 15 US banks
The Zeus/Zbot banking Trojan is reported to be attacking the Verified by Visa and MasterCard SecureCode verification systems introduced in recent years to stop old-style card not present (CNP) fraud. Read More


WEBCAST: Infoblox

Learn 4 Concepts to Network Automation
Join this webinar to learn where to start introducing network automation into your organization so you can: • Address Hidden IT Costs • Support Key Initiatives • Achieve Operational Optimization • Apply IT Resources More Strategically View Now!

IBM boosts IPS platform with Web application security, data-loss prevention
IBM Thursday announced it has added capabilities for Web application protection and data-loss prevention (DLP) to the basic technology platform for its intrusion-system prevention (IPS) product line. Read More

Some experts question efforts to identify cyberattackers
Efforts by the U.S. government to better identify cyberattackers will likely lead to violations of Internet users' privacy and anonymity, and technological means to attribute the source of the attacks may be inaccurate, privacy and cybersecurity experts said Thursday. Read More

Oracle releases 59 patches for security flaws, three critical
Oracle Corp. released 59 patches on Tuesday to fix security vulnerabilities across its entire range of database, application and middleware products. Read More

With fix now out, Microsoft sees jump in XP attacks
Microsoft urged Windows users to update their software Tuesday, saying it's now seen more than 25,000 attacks leveraging one of the critical bugs fixed in July's monthly security patches. Read More

Researchers find privacy flaws in Chatroulette
Perhaps there is finally something to deter Chatroulette.com users from their more offensive behavior: University researchers say that users of the popular video-chat site may not be as anonymous, or as private, as they think. Read More

BlackBerry offers users free security app
BlackBerry maker RIM has shown a new free application that owners can use to track their much-loved smartphones in the event they are lost, stolen, or simply misplaced around the house. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

SLIDESHOWS

Robocop ran DOS
Virtually no sci-fi or action flick these days is complete without a computer scene showing a few screens of mysterious scrolling text and a 3D wire-frame model. But where does this vaguely tech-looking stuff come from? Well, more often than not, it comes from a Website, app, or startup screen from the real world at the time the movie was made. Read on for some of the most unexpected tech cameos in movies.

Top Russian spy ring technology screw-ups
Alleged Russian spies arrested last month in cities around the United States seemed to be lacking in spycraft and in urgent need of some IT expertise, based on some of the gaffes they made. They also used some technologies effectively. Here is a summary of their efforts as revealed in court filings against them.

MOST-READ STORIES

  1. Robocop ran DOS
  2. DARPA issues call for computer science devotees
  3. Apple to hold iPhone 4 press conference Friday
  4. IE8 and Chrome are killing Firefox
  5. The Robin Sage experiment: Fake profit fools security pros
  6. Newest attack on your credit card: ATM shims
  7. Windows XP SP2 and 7 other things Microsoft has killed this year
  8. Researchers find privacy flaws in Chatroulette
  9. Cisco Linksys among "millions" of hackable routers
  10. Bluetooth at heart of gas station credit-card scam

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment