Friday, August 27, 2010

Low-threat worm caused 'most significant breach' of U.S. military net

  IBM: Cybersecurity problems are hitting record levels | Scammers hit Twitter, Facebook, send free iPad spam
 
  Network World Security

Forward this to a Friend >>>


Low-threat worm caused 'most significant breach' of U.S. military net
The most significant breach of U.S. military computers ever was carried out in 2008 by W32.SillyFDC, a low-level-threat worm that got into the network via a thumb drive plugged into a military laptop. Read More


WHITE PAPER: Tripwire

Where Compliance and Data Protection Overlap
Today's CISOs face more challenges than ever, including increased and more sophisticated threats, complex IT environments, decreased budgets, and greater compliance pressures. But these challenges present opportunity. Learn how CISOs can play these challenges to their advantage to meet both data protection and compliance demands. Read More!

WHITE PAPER: NetGear

In-The-Cloud Distributed Spam Analysis Technology
Distributed Spam Analysis technology provides the best protection against email-borne threats by providing more frequent threat updates that can quickly be leveraged by security solutions. Learn more.

IBM: Cybersecurity problems are hitting record levels
Cybersecurity vulnerabilities in key corproate tools such as Web apps, JavaScriot, PDFs, are increasing dramatically, having reached record levels for the first half of 2010, according to security watchers on IBM's X-Force research and development team. Read More

Scammers hit Twitter, Facebook, send free iPad spam
Facebook and Twitter users are complaining about their accounts being compromised and then being used to spam friends with suspicious "free iPad offers." Read More

Microsoft pulls a "Facebook" by exposing Windows Live users' names
Users remain outraged that changes in the privacy settings for Windows Live made in June have exposed their names and other data, with no fix in sight. Microsoft also managed to anger users of its free online services by merging friend lists from previously separate online services and by deleting data that didn't comply with revised versions of the tools. Read More


WHITE PAPER: Iron Mountain

Strategies for PST File Elimination
This paper will review the Mimosa NearPoint™ for Microsoft® Exchange disk-based data management solution, which optimizes the storage capabilities of Microsoft Exchange. Read Now.

NSF awards $20M to jazz up university research networks
The National Science Foundation this week said it spread $20 million across 17 universities or state education groups to enhance broadband access and bolster Internet connectivity for academic research at schools. Read More

Report: Sun, Microsoft and Mozilla leave the most vulnerabilities unpatched
Sun is the king of unpatched software vulnerabilities followed closely by Microsoft and Mozilla, according to the mid-year security report by IBM's X-Force. Read More

Facebook to pull IE6 plug for Chat
Facebook today announced that chat support for Microsoft's IE6 browser will be dropped on Sept. 15. Read More


WHITE PAPER: RIM

BlackBerry MVSv5.0 Feature Comparison
BlackBerry® Mobile Voice System (BlackBerry® MVS) has transformed . Read this graph to see the evolution of End User Features from BlackBerry MVS 4.6 to BlackBerry MVS Server 4.6.1 for Cisco® Unified Communications Manager v6.1 and later finally to BlackBerry MVS 5.0. Read Now

Nasty auto robocaller forced to pay $2.3M, sell Mercedes
At least this time one of these scammers is actually being hit in the wallet. Under a settlement with the Federal Trade Commission one of the telemarketers who blasted consumers with millions of illegal auto warranty robocalls last year will pay approximately $2.3 million in redress and give up his Mercedes. Read More

Google defends Android Market license server, despite reported hack
Android Market license server still a "significant step forward" against software piracy, Google maintains Read More

Attack of the Flash cookie zombies
Don't look now, but the Flash Zombies are after you. Read More

Windows DLL exploits boom; hackers post attacks for 40-plus apps
Some of the world's most popular Windows programs are vulnerable to a major bug in how they load critical code libraries, according to sites tracking attack code. Read More

FTC drops P2P file sharing probe of LimeWire
The Federal Trade Commission announced it has dropped an investigation into the file sharing software distributed by embattled LimeWare. Read More

 
 
 

Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

SLIDESHOWS

Cloud storage lives up to the hype
We tested five cloud-based storage services under real-world conditions. We set up accounts, connected with the vendor storage network, uploaded and downloaded files, measured performance and analyzed cost structures. Our conclusions are that cloud-based storage can save you money. And cloud-based storage can be fast. However, there are still security concerns that you need to be aware of.

Wireless networks and mobility quiz
iPhones and other handhelds bought for home use are infiltrating corporate networks, but there's a host of other wireless technologies that comprise a wave of mobile computing that is creating sweeping changes in business infrastructure. How well versed are you in the technical and not-so- technical details?

MOST-READ STORIES

  1. Zero-day Windows bug problem worse than first thought
  2. Linux community finally fixes 6-year-old critical bug
  3. Intel-McAfee deal baffles security analysts
  4. Android 2.2: How to install Flash on Froyo
  5. Intel buys McAfee: My two cents
  6. Microsoft won't showcase Hyper-V at VMworld
  7. Cameron Diaz could wreck your PC, McAfee warns
  8. Decorate with Linux
  9. Intel to buy McAfee in $7.68 billion blockbuster
  10. Does Intel buying McAfee have any impact on open source
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment