Search This Blog

Tuesday, August 17, 2010

Malicious widget hacked millions of Web sites

House Cybersecurity Caucus Launches New Website | Hacked smartphones pose military threat

Network World Security

Forward this to a Friend >>>


Malicious widget hacked millions of Web sites
A security expert estimates that between 500,000 and 5 million Network Solutions-hosted Web sites have been spreading malware for months. Read More


WHITE PAPER: Qwest

Security Strategies for Converged Networks
Convergence enables tremendous productivity gains and efficiencies, but merging previously disparate networks and applications can pose significant security risks. To prepare, IT organizations need to assess potential risks and take a holistic approach to building security into the network infrastructure. Read Now.

WHITE PAPER: Websense

Seven Criteria for Evaluating SaaS
The right Security-as-a-Service solution can perform reliably and effectively and deliver the flexibility and control associated with on-premise solutions — at a significantly lower cost — without compromising privacy and security. Read More

House Cybersecurity Caucus Launches New Website
Earlier this month, the House cybersecurity caucus launched a new web site in order to, "allow the public to have access to news and information in regard to cybersecurity policy." The House cybersecurity caucus is chaired by Congressmen Jim Langevin (D, RI) and Mike McCaul (R, TX), and includes 18 other members. The site can be found at: http://housecybersecuritycaucus.langevin.house.gov/ ... Read More


WHITE PAPER: Qwest

Manage Complexity, Cost and Compliance
To outsource or not to outsource IT security—that is the question for enterprises as they face increasingly complex cyber threats. Managed security services can help organizations alleviate the cost and complexity of proactively securing the IT infrastructure. Read Now.

Hacked smartphones pose military threat
Hacked smartphones could endanger troops by sending location data to the enemy using mechanisms similar to those employed by recently discovered Android malware, experts say. Read More


WHITE PAPER: Qwest

Data Protection and Your Customers
Many retailers are creating dynamic, immersive experiences that make shopping more convenient and enjoyable. But these interactions also create the potential for a security breach. Find out what's required for Payment Card Industry (PCI) compliance and the steps you should take to safeguard your customer's data—and trust. Read Now.

How to roll out full disk encryption on your PCs and laptops
Hardly a week goes by when some organization or another doesn't lose some laptops and face a litany of IT security questions.. One that always comes up: Were the systems encrypted? Read More

'Dislike' fraud spreads on Facebook
Beware the fake 'dislike' button that scammers are using to get Facebook users to hand over personal information, according to security firm Sophos. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

SLIDESHOWS

Supersize your WAN
Dual-WAN routers have come a long way. WAN connections are easier to establish, and all units we tested have configurable load balancing. The performance increase, not to mention the redundant Internet connections that all but guarantee uptime, should put these dual-WAN routers at the top of the shopping list for every small business that needs a router.

The recent history of governments vs. the Internet
Since the Web makes it far easier to access information than ever before, governments have had a harder time keeping the lid on information they don't want the public to consume and have often found themselves butting heads with tech companies who deliver Internet services or content. Here are some doozies.

MOST-READ STORIES

  1. Friday the 13th, Part II: Oracle officially ends OpenSolaris
  2. U.K. government could drop Microsoft for Linux
  3. Apple manager arrested over $1 million in kickbacks
  4. Apple kickback scheme: Don't let this happen to you
  5. Deathmatch: RIM BlackBerry Torch 9800 vs. Apple iPhone 4
  6. Dual-core smartphones on the horizon
  7. OpenSolaris is dead. Long live Solaris 11 Express
  8. 'Hope all is well' can be annoying as ...
  9. Stupid data center tricks
  10. Oracle sues Google over Java use in Android

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: