Tuesday, August 03, 2010

Microsoft Rushes Unscheduled Patch for Shortcut Flaw

  Keeping your company image safe on social media | Enterprises extend more business apps to employee smartphones
 
  Network World Security

Forward this to a Friend >>>


Microsoft Rushes Unscheduled Patch for Shortcut Flaw
Microsoft is issuing an out-of-band patch today to address rising attacks against the Windows shortcut vulnerability discovered last month. The update comes just over a week ahead of the regularly scheduled Patch Tuesday for the month of August, but leaves Windows 2000 and Windows XP SP2 systems to fend for themselves. Read More


WHITE PAPER: Insight

Examine Open Storage v. Proprietary Disk Systems
Download this whitepaper today and examine how Oracle's Sun Storage 7000 Unified Storage Systems offer a complete, open and integrated solution that: * Reduces time to deployment. * Lowers risk. * Simplifies storage deployment and management. Read now!

WHITE PAPER: MessageLabs

Employee Web Use and Misuse:
This white paper examines a Web security solution that gives companies the ability to monitor and enforce their Internet usage policies, bringing site monitoring and URL filtering together while insuring security with anti-virus and anti-spyware protection. Read Now

Keeping your company image safe on social media
The umbrella of security responsibilities now includes brand protection at many companies (See Brand protection: The expanding CSO portfolio for an in-depth look) and it seems like a constantly moving target. When the internet took off, organizations had to contend with scammers registering web site domains using company names for fraudulent purposes. Now similar activity is happening on the hottest forum for brand abuse--social networks. Read More

Enterprises extend more business apps to employee smartphones
Roughly 75% of senior IT executives plan to make internal applications available to employees on a variety of smartphones and mobile devices, according to new research from McAfee's Trust Digital unit. Read More


WHITE PAPER: Websense

Seven Criteria for Evaluating SaaS
The right Security-as-a-Service solution can perform reliably and effectively and deliver the flexibility and control associated with on-premise solutions — at a significantly lower cost — without compromising privacy and security. Read More

Meet the man who helped Lamo turn in Manning, the Wikileaker
In early June 2010 security pro Chet Uber got a phone call from Adrian Lamo, a well-known hacker he had worked with for a year in a volunteer-run intelligence organization. Lamo had received classified documents from a U.S. Army intelligence analyst named Bradley Manning and wanted advice about what to do. Uber told Lamo to turn Manning in. Read More

How to steal corporate secrets in 20 minutes: Ask
A few companies in the Fortune 500 need to upgrade their Web browsers. And while they're at it, a little in-house training on social engineering wouldn't be a bad idea, either. Read More


WHITE PAPER: MessageLabs

The Wild, Wild Web: How to Ensure 360-Degree Border Security
Managing the security and availability of Web, email, and IM is complex. This paper will discuss the modern threat of blended attacks from web, email and IM. and highlight how a comprehensive hosted solution by Symantec Hosted Services can secure your networks from these threat vectors. Read Now

Hacker snoops on GSM cell phones in demo
Despite concerns that federal authorities might fine or arrest him, hacker Chris Paget went ahead with a live demonstration of mobile phone interception at the Defcon hacking conference Saturday. Read More

U.S. military launches review of IT security after Wikileaks breach
U.S. Defense Secretary Robert Gates said military officials are launching a review of IT security procedures following the leaking of tens of thousands of classified documents related to the war in Afghanistan. Read More

'Unhackable' Android phone can be hacked
Once thought to be unhackable, the Android phone is anything but, according to researchers presenting at Black Hat 2010. Read More

Will Future Virtual Intelligence & Precrime Predictions Kill Privacy?
If crime could be stopped before it started, by use of virtual intelligence "future" searches, what might be the cost to privacy and online anonymity? When U.S. Intelligence communities have a strong mutual interest in the same projects as software companies whose products we use daily like Google or Microsoft, it raises more questions than it answers. If you recall Minority Report, then you probably... Read More

 
 
 

Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

SLIDESHOWS

Mobile deathmatch: Apple iOS 4 vs. Android 2.2
Apple's iOS has been wowing users for four years in the iPhone and now the iPad. Available in smartphones and now tablets from various vendors going on two years, Google's Android has proven itself to be a strong contender that has the only real chance to surpass iOS.

15 summer vacation ideas for geeks
From Star Trek and Space Camp to baseball minutiae, vintage video games, anime, pirates, Harry Potter and They Might Be Giants, there's a vacation option for any type of geek this summer.

MOST-READ STORIES

  1. Hacker snoops on GSM cell phones in demo
  2. WPA2 vulnerability found
  3. FBI rings organizers over Defcon contest
  4. Anatomy of a Cisco data center convert
  5. How to steal corporate secrets in 20 minutes: Ask
  6. 'Unhackable' Android phone can be hacked
  7. Black Hat gets its video feed hacked
  8. Happy SysAdmin Day (despite the pay)
  9. ATM hack gives cash on demand
  10. 12 top spy gadgets

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment